• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Uses of Encryption

Extracts from this document...

Introduction

Information Technology in a Global Society Chapter 3 - Encryption and Interception of Communications - Pg 129 Describe at least three different kinds of uses of encryption that have social value. (Indicate why they are valuable). * Encryption can be used to protect personal communications - such as telephone calls or email - from unauthorized access. This is very important because it gives users the ability the ensure that their privacy is maintained and not violated by preventing unauthorized people from being able to spy on their personal communications. * Encryption is also useful in protecting sensitive data - such as credit numbers for internet purchases - that is in transit from unauthorized access. Without encryption, internet purchases would be highly insecure as anyone would be able to intercept the financial details of buyers. Encryption therefore prevents the financial details of internet buyers from being stolen and as a result makes secure internet purchases possible. * As well, encryption is used to protect personal stored data - such as financial information and medical records - from unauthorized access and alteration. This is important because it gives people the ability to protect their privacy by giving them totally control over their own personal information. ...read more.

Middle

were already available freely on the Internet so anyone who wanted to - including terrorists - could use them to secure their communications. What are some reasons why a business might choose to use a private system to escrow encryption keys? The main reason as to why a business might choose to use a private escrow system is because with a commercial (public) key escrow system, law-enforcement agencies would be able - through a court order / search warrant - to gain access to the keys that would decrypt the encrypted data. Thus, by using an in-house (private) system to escrow encryption keys, businesses can have the confidence their encrypted data is secure and only authorized personnel can access it. What were some of the communications censored by the U.S. government during World War II? During World War II, the U.S. government employed a work-force of almost 15,000 people to open mail (in the range of about a million copies a day) being sent overseas and eliminate any that contained sensitive military information that would be of use to the then enemies Germany or Japan. Furthermore, people's telephone conversations were spied upon in addition to any form of communication that could be used to transmit sensitive military information to enemies. ...read more.

Conclusion

They fear that the FBI's carnivore system doesn't provide sufficient protection to guard against violations of user's privacy. Furthermore, potential incompatibilities of the system with the ISP can cause service inconvenient service interrupts at ISPs. Give similarities and differences between requirements to register our cars and requirements to register our encryption keys Digital cash can be designed to allow transactions to be made securely and anonymous. Considering the privacy benefits and potential for use by tax evaders and criminals, do you think fully anonymous digital cash should be made illegal? Give your reasons. In my opinion, fully anonymous digital cash should not be made illegal even though it can at times be used criminals and tax evaders. The main reason for this is because anonymous digital cash protects the privacy of the consumer and this benefit only outweighs any potential abuse by malicious people. Consider commercial key recovery, described in Section 3.4.2. Give some arguments in favor of requiring by law that all business users of encryption use a key recovery system approved by the government. Give some arguments against such a requirement. Reasons to support the use of a pub Critics argue that by giving the government backup copies of all encryption keys used by business, the system is open to possible abuse by the government as it has total control. ?? ?? ?? ?? I.T.G.S. Friday, October 05, 2007 Page 1 of 4 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. An Inconvenient Truth

    One of the wisest men to live on this planet stated that we would suffer our deepest consequences for our actions. This was stated by Winston Churchill who was implying that the ways the people were treating the earth with so much pollution, that we would one day indeed suffer for our actions.

  2. Information Technology in a Global Society - Is integrity a difficulty when students use ...

    About halfway through the process I threw students a curve ball. I knew that some were beginning to see the holes in their own research and I wanted to make sure they plugged these with substance, not generalities. To that end, I assigned a simple 750-word exercise that I provocatively titled "Does Wikipedia Suck?"

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    to take a more active role in managing your own health care. Electronic Health Records An electronic health record (EHR) is computer-based document that is used by your doctor, your doctor's staff, or a hospital. An EHR (similar to your old paper medical chart)

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Bibliography: 1. Wood, Zoe. "Amazon launches online groceries division as Ocado gears up for flotation." Guardian.co.uk. 7 July 2010. 10 Oct 2010. <http://www.guardian.co.uk/business/2010/jul/07/amazon-groceries-ocado-flotation> 2. Watrous, Lucinda. "Online Grocery Shopping: Pros and Cons." Bright Hub. 12 Feb 2010. 30 Sept 2010. <http://www.brighthub.com/money/personal-finance/articles/34470.aspx> 3. Blakemore, Erin. "Online Grocery Shopping." Love to know.

  1. Information Technology in a Global Society - analysis of an article "Using data mining ...

    The data set contains three predictor attributes, namely Age, Gender, Intensity of symptoms and one goal attribute, namely disease whose values (to be predicted from symptoms) indicates whether the matching patient have a certain disease or not. (Journal of computer science, 2006)

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    two big names in the market; two big corporations that have been competing for decades with each other. Mac OS X version 10.4 "Tiger" is the fifth major release of Mac OS X, Apple's desktop and server operating system for Macintosh computers.

  1. To what Extent Does Government Know What is Best for its Subjects? (Stimulus: Antigone)

    best for society's wellbeing; individuals should embrace government paternalism (which necessarily requires the diminishment of individual freedom) for societal safety. Hobbes suggests that in their natural state, individuals would resolve to an anarchic war of survival and self-interest. As such, Hobbes argues for a near-boundless figure of authority to curb the dangers of liberty.

  2. USA and Germany ties

    German-American political, economic, and security relationships continue to be based on close consultation and coordination at the most senior levels. High-level visits take place frequently, and the United States and Germany cooperate actively in international forums. (W5 - History of German-American Relations)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work