Cargando…

Decrypting the encryption debate : a framework for decision makers /

"Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions o...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: National Academies of Sciences, Engineering, and Medicine (U.S.). Computer Science and Telecommunications Board (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Washington, DC : The National Academies Press, [2018]
Colección:Consensus study report.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1032788096
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 180429s2018 dcu ob 000 0 eng d
040 |a DID  |b eng  |e rda  |e pn  |c DID  |d CUS  |d EBLCP  |d YDX  |d XFF  |d YDX  |d OCLCF  |d MERUC  |d IDB  |d EZ9  |d INT  |d OCLCQ  |d LVT  |d OCLCQ  |d UKAHL  |d N$T  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d SFB  |d OCLCL  |d TMA  |d OCLCQ 
019 |a 1036204716  |a 1037006239 
020 |a 9780309471541  |q (electronic book) 
020 |a 0309471540  |q (electronic book) 
020 |a 9780309471565  |q (electronic bk.) 
020 |a 0309471567  |q (electronic bk.) 
020 |z 0309471532 
020 |z 9780309471534 
024 8 |a DOI:10.17226/25010 
029 1 |a CHNEW  |b 001016426 
029 1 |a CHVBK  |b 523134223 
035 |a (OCoLC)1032788096  |z (OCoLC)1036204716  |z (OCoLC)1037006239 
043 |a n-us--- 
050 4 |a QA76.9.A25  |b N37 2018 
082 0 4 |a 005.8/24  |2 23 
049 |a UAMI 
110 2 |a National Academies of Sciences, Engineering, and Medicine (U.S.).  |b Computer Science and Telecommunications Board,  |e author. 
245 1 0 |a Decrypting the encryption debate :  |b a framework for decision makers /  |c Committee on Law Enforcement and Intelligence Access to Plaintext Information, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences. 
264 1 |a Washington, DC :  |b The National Academies Press,  |c [2018] 
300 |a 1 online resource (xiv, 104 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
490 1 |a A consensus study report of the National Academies of Sciences, Engineering, Medicine 
504 |a Includes bibliographical references. 
505 0 |a Summary. -- 1. Introduction. 1.1 Government options. 1.2 Scope and context for access. 1.3 Evaluation framework. -- 2. Encryption and its applications. 2.1 What is encryption? 2.2 Designing encryption. 2.3 Applications of encryption. 2.4 Encryption and the expanding cyber threat. -- 3. The role of encryption in protecting privacy and civil liberties. -- 5. Information needs of law enforcement and the intelligence community. 4.1 Goals of law enforcement officials and intelligence analysts. 4.2 The volume and diversity of information relevant to law enforcement and the intelligence community. 4.3 Encryption as an impediment to investigations. 4.4 The pracical utility of alternatives to exceptional access. 5. Opetions for accessing plaintext. 5.1 Options for accessing plaintext. 5.2 Legal tools for obtaining plaintext within the current legislative framework. 5.3 Technological approaches for accessing plaintext, limitations, and alternatives. 5.4 Enhanced financial and technical support. 5.5 Legislation mandating access. -- 6. International dimensions. 6.1 Effects of U.S. actions on other countries and the international market for U.S. goods and services. 6.2 Global norms. 7. A framework for evaluating approaches to access plaintext. -- Appendixes. -- Biographies of committee and staff. -- Briefers to the committee. 
520 |a "Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information"--Publisher's description 
588 0 |a Online resource; title from digital title page (viewed on June 19, 2018). 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Data encryption (Computer science) 
650 0 |a Civil rights  |z United States. 
650 0 |a Privacy, Right of  |z United States. 
650 0 |a Computer networks  |x Security measures  |x Social aspects. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Droits de l'homme  |z États-Unis. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Aspect social. 
650 7 |a Civil rights  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
650 7 |a Privacy, Right of  |2 fast 
651 7 |a United States  |2 fast  |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq 
653 |a Data Encryption (Computer Science) 
653 |a Computers 
776 0 8 |i Print version:  |a National Academies of Sciences, Engineering, and Medicine (U.S.). Computer Science and Telecommunications Board.  |t Decrypting the encryption debate.  |d Washington, DC : The National Academies Press, [2018]  |z 0309471532  |z 9780309471534  |w (OCoLC)1035823333 
830 0 |a Consensus study report. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5389609  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36565918 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36618497 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5389609 
938 |a EBSCOhost  |b EBSC  |n 1823567 
938 |a YBP Library Services  |b YANK  |n 15365548 
994 |a 92  |b IZTAP