1 INTRODUCTION
In this chapter, we will examine the fundamentals of data and information since these lie at the very heart of cyber security. Although the two terms are frequently used interchangeably, it is important to understand the essential difference between them. We shall also consider the wider context of cyber security and provide an overview of the remainder of the book.
BACKGROUND
Anyone born after the late 1980s will have little or no concept of life before mobile phones and the internet. They have grown up accustomed to searching the World Wide Web for resources; sending emails; shopping without leaving the house; listening to music and watching films online; keeping in touch with friends using social media; and a hundred and ...
Get Cyber Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.