Table of Contents
Information Systems Security:Enabling Future Internet Applications through Cryptography
Components of Security
A Definition of Digital Security
Why Should You Care?
Cryptography’s Role
Measuring Security
How Much Security is Enough?
Why Governments Care:Legislative Landscape
Current Regulations (U.S.)
Pending Legislation (U.S.)
Presentation Road Map
The Public Sector
Digital Security and Virtual Learning
UOC ARCHITECTURE
PPT Slide
Digital Security:UOC Applications and Issues
Digital Security: Current and Potential Issues
Digital Security: Potential Issues
Digital Security: Potential Issues
Digital Security:Next Step - Approaches
The Private Sector
Growth of Electronic Commerce
Field of Dreams: “Build It and They Will Come”
eShop Cybermall:A Unique Business Model
Big Brother Is Watching
Taming the “Wild Wild Web”
Big Business
Internet Banking
Lacunae
Next Steps
Government’s Role
Government and Encryption
Topics of Discussion
Need for Domestic Encryption Policy
Potential Models
Why “Dumbing Down” Does Not Work
Why “Smartening Up” Works
Next Steps
Recommendations
Recommendations (continued)
Beyond Cryptography
|