Computer technology has progressed very fast since its rather late inception. In the short period of half a century, it has spread to all walks of life. The complete integration of every area of business with computers has resulted in the development of many new areas. Computers have become tools of information generation and processing, and they are a vital interface of precious user data. From the beginning, vulnerabilities within various computing systems have been exploited.
The reasons are many. Many of the systems related to university/defense/industrial research where the financial windfalls involved were huge, are great hunting grounds for security breaches. Integration with business resulted in computer networks being a rich mine of user information that could be exploited through fraud and forgery for great windfalls as well. Nihilists and anarchists are always bent on wrecking havoc on all systems. All such motivations make the computer systems vulnerable to attacks.
Securing of such systems is, therefore, of utmost importance. Various security strategies are applied, one of which is encryption. In encryption, data is scrambled before transit to avoid detection, and descrambled at user end. Today, all forms of data undergo various levels of encryption – from email correspondence, to bank data.
In this section of web directory, we provide links to various security resources.