Muutke küpsiste eelistusi

E-raamat: Decrypting the Encryption Debate: A Framework for Decision Makers

  • Formaat: 118 pages
  • Ilmumisaeg: 07-May-2018
  • Kirjastus: National Academies Press
  • Keel: eng
  • ISBN-13: 9780309471541
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 4,08 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 118 pages
  • Ilmumisaeg: 07-May-2018
  • Kirjastus: National Academies Press
  • Keel: eng
  • ISBN-13: 9780309471541
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.



At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators.



Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.



Table of Contents



Front Matter Summary 1 Introduction 2 Encryption and Its Applications 3 The Role of Encryption in Protecting Privacy and Civil Liberties 4 Information Needs of Law Enforcement and the Intelligence Community 5 Options for Accessing Plaintext 6 International Dimensions 7 A Framework for Evaluating Approaches to Access Plaintext Appendix A Biographies of Committee Members Appendix B Briefers to the Committee
SUMMARY
1(94)
1 Introduction
5(9)
Government Options
9(3)
Scope and Context for Access
12(1)
Evaluation Framework
12(2)
2 Encryption and Its Applications
14(18)
What Is Encryption?
15(3)
Designing Encryption
18(2)
Applications of Encryption
20(5)
Protecting Stored Files
20(1)
Full Disk Encryption
21(1)
Device Locking
22(1)
Virtual Private Networks
22(1)
Secure Web Browsing
23(1)
Secure Messaging
24(1)
Protecting Confidentiality in Cloud or Third-Party Computing
25(1)
Encryption and the Expanding Cyber Threat
25(7)
Cyber Threats
27(2)
The Role of Encryption and Other Forms of Cryptography in Cybersecurity
29(2)
The Limits of Encryption for Cybersecurity
31(1)
3 The Role of Encryption In Protecting Privacy and Civil Liberties
32(4)
4 Information Needs of Law Enforcement and the Intelligence Community
36(13)
Goals of Law Enforcement Officials and Intelligence Analysts
36(1)
The Volume and Diversity of Information Relevant to Law Enforcement and the Intelligence Community
37(3)
Encryption as an Impediment to Investigations
40(5)
The Practical Utility of Alternatives to Exceptional Access
45(4)
5 Options for Accessing Plaintext
49(29)
Options for Accessing Plaintext
49(1)
Legal Tools for Obtaining Plaintext within the Current Legislative Framework
50(6)
Compelled Disclosure of Biometric Identifiers or Passcodes
50(2)
Compelled Assistance by Third Parties and Related Issues
52(3)
Legal Aspects of Lawful Hacking
55(1)
Technological Approaches for Accessing Plaintext, Limitations, and Alternatives
56(17)
Approaches to Exceptional Plaintext Access
56(10)
Future Cryptographic Technologies
66(1)
Ways to Bypass a Plaintext Access Mandate
67(3)
Alternatives to Exceptional Access
70(3)
Enhanced Financial and Technical Support
73(3)
Legislation Mandating Access
76(2)
6 International Dimensions
78(5)
Effects of U.S. Actions on Other Countries and the International Market for U.S. Goods and Services
80(1)
Global Norms
81(2)
7 A Framework for Evaluating Approaches to Access Plaintext
83(12)
APPENDIXES
A Biographies of Committee Members
95(8)
B Briefers to the Committee
103