Policy Perspectives and Strategy for Communication Data and Network Security Projects and Tools: Issues and Challenges in India

Policy Perspectives and Strategy for Communication Data and Network Security Projects and Tools: Issues and Challenges in India

DOI: 10.4018/978-1-4666-5146-3.ch018
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter highlights the constant increase in the number of attacks on computer network systems, which has pushed governments, researchers, and experts to devise better security policies and strategies. However, the rapid growth of systems, components, and services offered has increased the difficulty of administering them. In many organizations in developed and developing countries, more emphasis is being given on use of Automatic Computing for proper network security. The chapter clarifies how various projects and tools could be relevant for network security. The chapter provides insights about what steps have been taken for network security in a developing country like India. It looks into various strategies adopted for communication data and network security in India. It emphasizes that, with increasing demand for basic/citizen services over the Internet, it has become important to protect data and ensure efficient backup and data recovery. The chapter proposes a need for better and effective policy and strategy for communication data and network security to make the government citizen-oriented in developing countries.
Chapter Preview
Top

Projects And Tools For Network Security

The information technology revolution has changed the way business is transacted, government operates, and national defence is conducted. Those three functions now depend on an interdependent network of critical information infrastructures (Bush, 2002). Through the Internet, a government can provide information and allow citizens, businesses, and other governments to make a wide variety of transactions and to participate in various forums (Das, DiRienzo and Burbridge, 2009, p.1). All the government agencies/bodies, private sectors, common computer users, etc. could be affected by network security breaches.

Complete Chapter List

Search this Book:
Reset