Saturday, May 16, 2020

Encryption Privacy versus National Security Essay

Abstract: The use of encryption by individuals is growing at a tremendous rate, and since 1991 cryptography issues have engulfed both the U.S. government as well as the computing industry. One of the most controversial of these issues is whether encryption should be made supremely secure to the highest-level current technology will allow, or whether a master key should be locked away somewhere, only to be used when absolutely justified. Both sides of the issue have their benefits and detriments; the problem is finding the middle ground that will provide the greatest benefit to society. In the past decade, rapid advances have been made in the field of cryptography. These advances have brought considerable†¦show more content†¦DES encrypts data using a 56-bit key, which means that there are 256 possible key values. Before the 90s, cracking such a scheme was simply beyond the scope of any supercomputer. Therefore, the computing community accepted DES as secure, although initially it was very controversial, due to the National Security Agency altering its design before adopting it as a standard.[2] The government also accepted DES because the use of digital communications and the Internet itself were both still in their infancy, and so their traditional methods of providing national security were still valid. The only people who really used encryption were the government itself and large companies.[3] With the rise of the World Wide Web and increasingly widespread use of network services such as email, the government began to become concerned about the possible implications of securely encrypted communications. Specifically, the release of free software called Pretty Good Privacy in 1991 by Philip Zimmerman caused the most concern.[3] PGP allows encryption of email and other documents using the RSA public key standard with a 128 bit key, currently uncrackable by anyone, or any government. Around the same time that the government was losing faith in the current cryptography policies, the computing public began losing faith in DES, and rightly so. Moores Law made the original DES algorithm officially obsolete in 1998,Show MoreRelatedThe Security Vs. Privacy1537 Words   |  7 Pages1. At stake are two forces representing a critical dilemma of the post-2001 world: security vs. privacy. Fighting for security, the FBI is seeking â€Å"backdoor† access to the iPh one in question that was used by one of the two suspects in the San Bernardino shooting in December 2015. Defending privacy is Apple, Inc., designer and marketer of the Apple iPhone. The two suspects under investigation are linked with known terrorist groups, possibly ISIS, with definitive proof of these links locked away inRead MoreMonitoring And Collection Of Phone Data1521 Words   |  7 PagesIt is a matter of privacy versus security; in order for the country to be more secure against terrorism, the public must give up some privacy in the form of phone data. Phone data should only be collected when it comes to serious threats to national security using a warrant provided by the judicial system to collect a specific person’s or group of people’s phone data. 9/11 was the largest attack ever on U.S. soil and prompted a government reaction. Not only was airport security heavily increasedRead MoreThe Tension Between National Security And Individual Privacy1213 Words   |  5 PagesThe Situation The tension between national security and individual privacy has long existed even before the development of digitized information. Recently, two main forces have advanced the debate over this balance to the forefront of the public eye: 1) the proliferation of data by private sector companies and 2) the heightened need for homeland security and public defense. With the rapid evolution of technology, companies have aggregated pools of consumer data to improve upon internal decision makingRead MoreThe United States1326 Words   |  6 Pagesbut around the globe. Cybersecurity has been identified as one of the most challenging subjects of the 21st-century; moreover, cyber-attacks can further compromise the future of our economic development as much as our national security and the decrement of our civil rights and privacy. Since Obama initiate his administration, he has been working on establishing the framework to better balance the interaction between, government agencies, private sec tor, and the general public. The objective in thisRead MoreNSA Spying - What is Metadata and What Does the Law Say?1384 Words   |  6 Pagessocial media sites like Instagram, Facebook, Yahoo, and or Google. This information is all collected, stored, and tracked by big brother, and what are they doing with it, is the metadata being secured, American’s may never know. Disturbingly the National Security Agency (NSA) has been collecting metadata on Americans personal telephones and electronics devices for several years. This collection was happening before the NSA Analyst Edward Snowden leaked these facts to the world in late 2013. The NSA wasRead More Security Versus Privacy Essay2302 Words   |  10 PagesSecurity Versus Privacy As a result of 9/11, our country has been faced with a new issue: electronic privacy. The terrorists that attacked us used our own technology against us to protect their activities from our view. Because of this, we are now forced to make a decision between two desirable things: privacy and national security. On the one hand, our right to privacy will ensure that our personal rights are not violated, whereas, on the other hand, national security would allow us some comfortRead MoreThe Nsas Program Prism1687 Words   |  7 Pages‘â€Å"e-mail, chat, videos, photos, stored data, VoIP, file transfers, video conferencing, notifications of target activity...†Ã¢â‚¬â„¢ (para. 17). Essentially, this data and metadata were being analyzed by the NSA and other government agencies for tracking and security purposes. Metadata, according to Pfleeger, C., Pfleeger, S., and Margulies (2015), is data tracking that â€Å"can occur with data the user or owner does not even know [exists ]† (p. 529). This is exactly what Snowden believed needed to be shared withRead MoreThe United States Government s Primary Priority2056 Words   |  9 Pagesnetworks have changed the very fabric of our fundamental neural network processes in our brain, and which without it the modern society’s globally interconnected society would be impossible to function. The Americans value and respect their security and privacy of their lives in all aspects and that, cyberspace is no less for them. All aspects of American society today depend on the internet and information networks, including communication, transportation, health and government e-services. How isRead MoreEnsuring User Data Protection And Privacy1937 Words   |  8 Pages##Ensuring User Data Protection Privacy## While access to sensitive data on the network is governed via â€Å"Access Control† (Refer to Chapter 7 on Network Security), you can assist with additional privacy to users by ensuring they adopt the following secure data communication storage practices, provided these practices constitute approaches identified during the organization’s Risk Assessment (Refer to Chapter 1). Keep laws regulations related to encryption in mind before recommending these bestRead MoreThe Case Between The Company Apple And The Fbi1077 Words   |  5 Pagespeople s privacy and law enforcement over stepping there boundaries. Instead of just breaking into Farook’s phone, the FBI wanted Apple to develop a new software were there is a master key to unlock every phone. The FBI later withdrew their case against Apple due to the fact a third party was paid to unlock the phone, and obtain information they needed. Once the phone was unlocked this caused concern with Apple, if the FBI was ab le to find ways to break into iPhone and take data encryption then Apple

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.