Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Decrypting the Encryption Debate - A Framework for Decision Makers (Paperback)
Loot Price: R1,183
Discovery Miles 11 830
|
|
Decrypting the Encryption Debate - A Framework for Decision Makers (Paperback)
Expected to ship within 12 - 17 working days
|
Encryption protects information stored on smartphones, laptops, and
other devices - in some cases by default. Encrypted communications
are provided by widely used computing devices and services - such
as smartphones, laptops, and messaging applications - that are used
by hundreds of millions of users. Individuals, organizations, and
governments rely on encryption to counter threats from a wide range
of actors, including unsophisticated and sophisticated criminals,
foreign intelligence agencies, and repressive governments.
Encryption on its own does not solve the challenge of providing
effective security for data and systems, but it is an important
tool. At the same time, encryption is relied on by criminals to
avoid investigation and prosecution, including criminals who may
unknowingly benefit from default settings as well as those who
deliberately use encryption. Thus, encryption complicates law
enforcement and intelligence investigations. When communications
are encrypted "end-to-end," intercepted messages cannot be
understood. When a smartphone is locked and encrypted, the contents
cannot be read if the phone is seized by investigators. Decrypting
the Encryption Debate reviews how encryption is used, including its
applications to cybersecurity; its role in protecting privacy and
civil liberties; the needs of law enforcement and the intelligence
community for information; technical and policy options for
accessing plaintext; and the international landscape. This book
describes the context in which decisions about providing authorized
government agencies access to the plaintext version of encrypted
information would be made and identifies and characterizes possible
mechanisms and alternative means of obtaining information. Table of
Contents Front Matter Summary 1 Introduction 2 Encryption and Its
Applications 3 The Role of Encryption in Protecting Privacy and
Civil Liberties 4 Information Needs of Law Enforcement and the
Intelligence Community 5 Options for Accessing Plaintext 6
International Dimensions 7 A Framework for Evaluating Approaches to
Access Plaintext Appendix A Biographies of Committee Members
Appendix B Briefers to the Committee
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.