Trends in Data Protection and Encryption Technologies

This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38...

Full description

Saved in:
Bibliographic Details
Other Authors: Mulder, Valentin (Editor), Mermoud, Alain (Editor), Lenders, Vincent (Editor), Tellenbach, Bernhard (Editor)
Format: Electronic Book Chapter
Language:English
Published: Cham Springer Nature 2023
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_112833
005 20230817
003 oapen
006 m o d
007 cr|mn|---annan
008 20230817s2023 xx |||||o ||| 0|eng d
020 |a 978-3-031-33386-6 
020 |a 9783031333866 
020 |a 9783031333859 
040 |a oapen  |c oapen 
024 7 |a 10.1007/978-3-031-33386-6  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UR  |2 bicssc 
072 7 |a UB  |2 bicssc 
072 7 |a GPJ  |2 bicssc 
100 1 |a Mulder, Valentin  |4 edt 
700 1 |a Mermoud, Alain  |4 edt 
700 1 |a Lenders, Vincent  |4 edt 
700 1 |a Tellenbach, Bernhard  |4 edt 
700 1 |a Mulder, Valentin  |4 oth 
700 1 |a Mermoud, Alain  |4 oth 
700 1 |a Lenders, Vincent  |4 oth 
700 1 |a Tellenbach, Bernhard  |4 oth 
245 1 0 |a Trends in Data Protection and Encryption Technologies 
260 |a Cham  |b Springer Nature  |c 2023 
300 |a 1 electronic resource (262 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a reference for organizations and individuals that need to elaborate coherent and efficient data protection and encryption strategies in the coming years. The 38 technologies have been sorted into five categories. First, encryption foundations represent the technologies used to create other encryption applications. Second, low-level applications represent the technologies that focus on micro functionalities. Third, high-level applications represent the technologies that focus on more abstract and macro functionalities. Fourth, data protection represents the technologies used to protect data without encrypting these data. Finally, use cases represent concrete ways the different technologies can be used together to create a working solution. The book serves as a guide for decision-making within administrations, government organizations, and industry. It will also be interesting for the tech-savvy board member or engineers looking to get an entry point into data protection topics. Last not least, the book will also be a valuable reading for anyone interested in data protection and encryption. 
540 |a Creative Commons  |f by/4.0/  |2 cc  |4 http://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Computer security  |2 bicssc 
650 7 |a Information technology: general issues  |2 bicssc 
650 7 |a Coding theory & cryptology  |2 bicssc 
653 |a Trusted Execution 
653 |a Blockchain 
653 |a Digital Rights Management 
653 |a Data Protection 
653 |a Authentication 
653 |a Encryption 
653 |a Cyber-Defence 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/75398/1/978-3-031-33386-6.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/112833  |7 0  |z DOAB: description of the publication