MARC보기
LDR06191cmm u2200661Ii 4500
001000000317123
003OCoLC
00520230525181919
006m d
007cr cnu---unuuu
008180429s2018 dcu ob 000 0 eng d
019 ▼a 1036204716 ▼a 1037006239
020 ▼a 9780309471541 ▼q (electronic book)
020 ▼a 0309471540 ▼q (electronic book)
020 ▼a 9780309471565 ▼q (electronic bk.)
020 ▼a 0309471567 ▼q (electronic bk.)
020 ▼z 0309471532
020 ▼z 9780309471534
0248 ▼a DOI:10.17226/25010
035 ▼a 1823567 ▼b (N$T)
035 ▼a (OCoLC)1032788096 ▼z (OCoLC)1036204716 ▼z (OCoLC)1037006239
040 ▼a DID ▼b eng ▼e rda ▼e pn ▼c DID ▼d CUS ▼d EBLCP ▼d YDX ▼d XFF ▼d YDX ▼d OCLCF ▼d MERUC ▼d IDB ▼d EZ9 ▼d INT ▼d OCLCQ ▼d LVT ▼d OCLCQ ▼d UKAHL ▼d N$T ▼d 248032
043 ▼a n-us---
049 ▼a MAIN
050 4 ▼a QA76.9.A25 ▼b N37 2018
08204 ▼a 005.8/24 ▼2 23
1102 ▼a National Academies of Sciences, Engineering, and Medicine (U.S.). ▼b Computer Science and Telecommunications Board, ▼e author.
24510 ▼a Decrypting the encryption debate : ▼b a framework for decision makers / ▼c Committee on Law Enforcement and Intelligence Access to Plaintext Information, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences.
260 ▼a Washington, DC : ▼b The National Academies Press, ▼c [2018]
300 ▼a 1 online resource (xiv, 104 pages)
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
347 ▼a text file ▼2 rda
347 ▼b PDF
4901 ▼a A consensus study report of the National Academies of Sciences, Engineering, Medicine
504 ▼a Includes bibliographical references.
5050 ▼a Summary. -- 1. Introduction. 1.1 Government options. 1.2 Scope and context for access. 1.3 Evaluation framework. -- 2. Encryption and its applications. 2.1 What is encryption? 2.2 Designing encryption. 2.3 Applications of encryption. 2.4 Encryption and the expanding cyber threat. -- 3. The role of encryption in protecting privacy and civil liberties. -- 5. Information needs of law enforcement and the intelligence community. 4.1 Goals of law enforcement officials and intelligence analysts. 4.2 The volume and diversity of information relevant to law enforcement and the intelligence community. 4.3 Encryption as an impediment to investigations. 4.4 The pracical utility of alternatives to exceptional access. 5. Opetions for accessing plaintext. 5.1 Options for accessing plaintext. 5.2 Legal tools for obtaining plaintext within the current legislative framework. 5.3 Technological approaches for accessing plaintext, limitations, and alternatives. 5.4 Enhanced financial and technical support. 5.5 Legislation mandating access. -- 6. International dimensions. 6.1 Effects of U.S. actions on other countries and the international market for U.S. goods and services. 6.2 Global norms. 7. A framework for evaluating approaches to access plaintext. -- Appendixes. -- Biographies of committee and staff. -- Briefers to the committee.
520 ▼a "Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information"--Publisher's description.
5880 ▼a Online resource; title from digital title page (viewed on June 19, 2018).
590 ▼a Added to collection customer.56279.3
650 0 ▼a Data encryption (Computer science)
650 0 ▼a Civil rights ▼z United States.
650 0 ▼a Privacy, Right of ▼z United States.
650 0 ▼a Computer networks ▼x Security measures ▼x Social aspects.
650 7 ▼a Civil rights. ▼2 fast ▼0 (OCoLC)fst00862627
650 7 ▼a Data encryption (Computer science) ▼2 fast ▼0 (OCoLC)fst00887935
650 7 ▼a Privacy, Right of. ▼2 fast ▼0 (OCoLC)fst01077444
651 7 ▼a United States. ▼2 fast ▼0 (OCoLC)fst01204155
655 4 ▼a Electronic books.
77608 ▼i Print version: ▼a National Academies of Sciences, Engineering, and Medicine (U.S.). Computer Science and Telecommunications Board. ▼t Decrypting the encryption debate. ▼d Washington, DC : The National Academies Press, [2018] ▼z 0309471532 ▼z 9780309471534 ▼w (OCoLC)1035823333
830 0 ▼a Consensus study report.
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1823567
938 ▼a Askews and Holts Library Services ▼b ASKH ▼n AH36618497
938 ▼a EBL - Ebook Library ▼b EBLB ▼n EBL5389609
938 ▼a YBP Library Services ▼b YANK ▼n 15365548
938 ▼a EBSCOhost ▼b EBSC ▼n 1823567
990 ▼a 관리자
994 ▼a 92 ▼b N$T