How society can balance the need to be able to investigate

Assignment Help Management Information Sys
Reference no: EM131837608

Regulatory Environment Surrounding Encryption

Governments all over the world, including the U.S. government, have concerns about the use of encryption. This concern manifests itself in a range of regulatory challenges to the technology that limit or restrict its use.

The concerns, and therefore the regulations, differ from nation to nation. One example of this comes from the early years of encryption in the United States. Diffie-Hellman and the guys at RSA came up with the mathematical foundations for today's symmetric encryption solutions in the late 1970s.

The NSA tried to block this research from being published because they felt it was a threat to their oversight of security matters. In the meantime, the barriers to research and the patent laws that favored offshore development caused a number of researchers in foreign countries to put their attention to potential technologies.

Among those were PGP, or pretty good privacy. By the early 1990s the United States Congress, at the behest of the NSA and other intelligence agencies, were casting about for regulations that could restrict the impact of encryption, including a requirement that anyone manufacturing an encryption-based technology create a backdoor into their solutions or engage in 'key escrow' where the keys to an encryption algorithm would be held by a neutral third party.

This controversy and the reaction to it is comparable to the more recent fight over the SOPA (Stop Online Piracy Act) rules, over which Internet providers and users pushed back at Congress.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Discuss the following:

Explain how society can balance the need to be able to investigate wrongdoing with the important and beneficial aspects of encryption as a security tool.

Evaluate the legal/regulatory impact for a multinational organization doing business in China, India, Ireland, and the United States that would like to implement IPSec as a component of a move to IPv6.

Describe the major differences between symmetric and asymmetric encryption technologies.

Reference no: EM131837608

Questions Cloud

Having trouble figuring out a function : I am doing an excel assignment and having trouble figuring out a function. I have two columns, A and B and I need to figure out a function
What is the benefit of purchasing distressed property : What is the benefit of Purchasing a Distressed Property?
How is the re-emergence of china reshaping relation of power : How is the re-emergence of China reshaping relations of power in the global economy? Provide examples to support your argument.
Formulate expressions in terms of count : Assume that you have a variable called count that will take on the values 1,2,3, 4 and so on. you are going to formulate expressions in terms of count
How society can balance the need to be able to investigate : Explain how society can balance the need to be able to investigate wrongdoing with the important and beneficial aspects of encryption as a security tool.
Write a query that displays a list of all customers : Write a query that displays a list of all customers showing the customer first name, last name, and phone number.
How much will you have to pay every two years : You are thinking about buying a piece of art that costs $40,000. If the interest rate is 6% per year, how much will you have to pay every two years?
Prepare a business portfolio and dynamic capability report : MBA501 Dynamic Strategy and Disruptive Innovation Business Portfolio and Dynamic Capability Development Report Assignment. Review an organisation case study
Risks of international trade on google financial statements : What are the major impacts and specific risks of international trade on google financial statements.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd