Decrypting the Encryption Debate

A Framework for Decision Makers

Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Engineering, and Medicine National Academies of Sciences, et al.

PDF
ca. 3,88
Amazon iTunes Thalia.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

National Academies Press img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Naturwissenschaften allgemein

Beschreibung

Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threatsfrom a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "e;end-to-end,"e; intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized byinvestigators.Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.

Weitere Titel von diesem Autor
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Division on Engineering and Physical Sciences
Weitere Titel in dieser Kategorie
Cover Astrobiology
Andrew May
Cover Living Matter
Alexander Levine
Cover Untitled
Christian Davenport
Cover The Merlin
Frank Rennie
Cover No Island Too Far
Michael Brooke
Cover The Game of Species
Julián Simón López-Villalta
Cover Elusive Cures
Nicole Rust
Cover Secondary Ion Mass Spectrometry
Paweł Piotr Michałowski
Cover Unequal
Eugenia Cheng
Cover Life's Devices
Steven Vogel

Kundenbewertungen