Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information
Examines Federal policies directed at protecting information, particularly in electronic communications systems. Examines the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these systems. Addresses important trends taking place in the private sector. Charts and tables.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control adversaries algorithm ANSI applications automated information systems banks biometric civilian agencies classiﬁed commercial communications systems computer and communications computer security concerns conﬁdentiality cryptography Data Encryption Data Encryption Standard databases decryption defense and intelligence devices digital signature electronic fund electronic fund transfers electronic information encrypting key equipment Ernst & Whinney example Federal agencies Federal Government Federal policies ﬁrms hand geometry hardware identiﬁcation industry inﬂuence information safeguards information security information systems integrity interception knapsack ment message authentication misuse modules N SA National Security Agency needs nondefense operations Option OTA staff passwords plaintext private sector protect public-key cryptography puter require responsibilities rity role SA’s safeguard technology satellite secret key secu signals signiﬁcant STU-III Systems Security tech technical techniques Telecommunications telephone tion tional transactions unclassiﬁed unclassified information users vendors vulnerabilities
Page 141 - Restricted Data' means all data concerning (1) design, manufacture, or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy, but shall not include data declassified or removed from the Restricted Data category pursuant to section 142.
Page iii - HR 32, before the Subcommittee on Civil and Constitutional Rights of the House Committee on the Judiciary, 94th Cong., 2d Sess.
Page 166 - ... information, as well as the privacy or confidentiality of personal or commercial proprietary information provided to the US Government by its citizens. SECTION III - APPLICABILITY This policy applies to all Federal Executive Branch Departments and Agencies, and entities, including their contractors, which electronically transfer, store, process, or communicate sensitive, but unclassified information. SECTION IV - RESPONSIBILITIES This policy assigns to the heads of Federal Government Departments...
Page 143 - It is the policy of this Administration that, to the maximum extent possible, the products of fundamental research remain unrestricted. It is also the policy of this Administration that, where the national security requires control, the mechanism for control of information generated during federallyfunded fundamental research in science, technology and engineering at colleges, universities and laboratories is classification.
Page 147 - Before the Subcommittee on Science, Research, and Technology and the Subcommittee on Transportation, Aviation, and Materials of the House Committee on Science, Space, and Technology, 100th Cong., 1 st sess.
Page 85 - Trusted Computer System - A system that employs sufficient hardware and software integrity measures to allow its use for processing simultaneously a range of sensitive or classified information.
Page 166 - Sensitive but unclassified information is information the disclosure, loss, misuse, alteration or destruction of which could adversely affect national security or other federal government interests. National security interests are those unclassified matters that relate to the national defense or the foreign relations of the US Government. Other government interests are those related, but not limited to the wide range of government or government-derived economic, human, financial, industrial, agricultural,...
Page 147 - Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy; and (5) the term "Federal agency...