The changing face of computing is a ripple effect of the way that organizations and people are increasingly connecting via the internet.
Cyberspace is extremely difficult to secure. The sheer worldwide expanse for criminal location is the least of the challenges. The increasing integration between cyberspace and the physical world has exponentially expanded the opportunities for theft, damage, and corruption. Emerging targets for crime are multiplying as the connection between the cyber world, and the physical one develops new associations. Reducing vulnerabilities and minimizing consequences in complex cyber networks are the goals, but ones that are increasingly difficult to achieve.
To combat this trend, IBM developed a process for their z System processing called Pervasive Encryption. SIL wrote a white paper on the amount of protection that can be expected from Pervasive Encryption. This white paper of the analysis is available for download.