“The tie, if I might suggest it, sir, a shade more tightly knotted. One
aims at the perfect butterfly effect. If you will permit me _”
“What does it matter, Jeeves, at a time like this? Do you realize that
Mr. Little’s domestic happiness is hanging in the scale?”
“There is no time, sir, at which ties do not matter.”
—Very Good, Jeeves! P. G. Wodehouse
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.
Two trends have come together to make the topic of this channel of vital interest.
First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to
protect data and resources from disclosure, to guarantee the authenticity of data and
messages, and to protect systems from network-based attacks.
Second, the disciplines of cryptography and network security have matured, leading to the development of practical,readily available applications to enforce network security.