MARC보기
LDR03833cmm u2200541Ii 4500
001000000314941
00520230525165603
006m d
007cr mn|||||||||
008170213t20172017dcua ob 000 0 eng d
019 ▼a 973770046
020 ▼a 9781442279964 ▼q (electronic bk.)
020 ▼a 1442279966 ▼q (electronic bk.)
020 ▼z 9781442279957 (pb)
020 ▼z 1442279958 (pb)
035 ▼a 1472400 ▼b (N$T)
037 ▼a 993941 ▼b MIL
040 ▼a AWC ▼b eng ▼e rda ▼e pn ▼c AWC ▼d N$T ▼d IDEBK ▼d 248032
050 4 ▼a QA76.9.A25 ▼b L49 2017
072 7 ▼a COM ▼x 083000 ▼2 bisacsh
08204 ▼a 005.824 ▼2 23
1001 ▼a Lewis, James A., ▼e author.
24514 ▼a The effect of encryption on lawful access to communications and data / ▼c authors, James A. Lewis, Denise E. Zheng, William A. Carter. ▼h [electronic resource]
260 1 ▼a Washington, DC : ▼b Center for Strategic & International Studies ; ▼a Lanham, MD : ▼b Rowman & Littlefield, ▼c [2017]
300 ▼a 1 online resource (v, 39 pages) : ▼b color illustrations
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
347 ▼a text file ▼b PDF ▼2 rda
500 ▼a "February 2017."
500 ▼a "A report of the CSIS Technology Policy Program."
504 ▼a Includes bibliographical references.
5050 ▼a Introduction : encryption's effect on lawful access to communications and data -- How prevalent is unrecoverable encryption? -- Data on going dark -- Global concern, but no global consensus -- Accessing plaintext -- Options for managing the encryption problem -- Balancing individual rights and the social good.
520 ▼a "Many have drawn parallels between today's debate over 'Going Dark' and the 'Crypto Wars' of the 1990s, but much has changed since then. First, the Internet has become central to global economic activity, politics, and security. The security environment has changed, as we face much more aggressive state actors in espionage. The Snowden revelations in 2013 damaged the credibility of U.S. tech companies operating abroad, and any requirement that they facilitate U.S. government access to their customers' communications could affect their international competitiveness. Terrorists and criminals find creative ways to leverage the latest technologies to evade law enforcement. Technology continues to evolve, making unrecoverable encryption easier for individuals to obtain and use. Furthermore, any U.S. policy on encryption might set a precedent that other countries would be tempted to follow. While the debate thus far has pitted privacy and individual security against the critical task of stopping criminals and terrorists, there may be technical and policy solutions that can balance national security and public safety with protection of privacy, civil liberties, and a functioning global Internet ecosystem"--Publisher's web site.
588 ▼a Description based on online resource; title from PDF title page (CSIS, viewed February 13, 2017).
650 0 ▼a Data encryption (Computer science)
650 0 ▼a Data encryption (Computer science) ▼x Law and legislation.
650 0 ▼a Data recovery (Computer science)
650 0 ▼a Data recovery (Computer science) ▼x Law and legislation.
650 7 ▼a COMPUTERS / Security / Cryptography ▼2 bisacsh
655 4 ▼a Electronic books.
7001 ▼a Zheng, Denise E., ▼e author.
7001 ▼a Carter, William A., ▼e author.
7102 ▼a CSIS Technology and Public Policy Program, ▼e issuing body.
7102 ▼a Center for Strategic and International Studies (Washington, D.C.), ▼e publisher.
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1472400
938 ▼a EBSCOhost ▼b EBSC ▼n 1472400
938 ▼a Ingram Digital eBook Collection ▼b IDEB ▼n cis37676687
990 ▼a 관리자