EconPapers    
Economics at your fingertips  
 

The fight within encryption

Sammy Basu

Cyber Security: A Peer-Reviewed Journal, 2017, vol. 1, issue 1, 44-47

Abstract: Powered by rapid growth in hardware capabilities and easy availability of encryption technologies, network traffic is entering a phase of ‘encrypt everything’. Encryption protects network traffic from interception by intruders. It also renders the traffic unintelligible to Infosec teams, who are hindered by the inability to detect and distinguish the good traffic from the evil. In recent times we have witnessed a sharp spike in encrypted malware attacks. Do technical security problems have straightforward technical solutions? ‘It depends’, as the seasoned security professional would say. This paper discusses the various types of encrypted attacks along with the legal and ethical aspect of the proposed technical solutions.

Keywords: encryption; malware; ransomware; https attacks; endpoint security; SSL decryption; security ethics; internet security legal concerns (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/2292/download/ (application/pdf)
https://hstalks.com/article/2292/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2017:v:1:i:1:p:44-47

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2017:v:1:i:1:p:44-47