|
|
August, 2003
Security: Secrets,
Intruders and ID Tags
51
pages
This
report examines the current state of security technologies, organizes
key issues and puts them in context, and succinctly explains how
the technologies work.
Security researchers are aiming to protect computer data, hardware,
and software from intruders. They are finding methods of tracking
data, objects, and people. And they are exploring ways to protect
privacy on the Internet and in the real world.
The technologies involved include cryptography, data hiding methods,
data finding methods, information privacy, hardware security, system
recovery, Internet security, property protection, intelligent tracking,
and biometrics.
Security methods run the gamut from finding twists on encryption
schemes, to gleaning secret information from patterns, to constructing
cheap plastic tags that can be used to identify objects, to making
microscopic glowing beads that can be used to hide information in
a document.
The report includes an executive summary, a list of 23 developments
to look for as these cutting-edge technologies take shape, and a
section of 31 researchers to watch, including links to their Web
pages. It also includes a quick tour of 41 recent developments in
seven areas and a section of 33 in-depth news stories from TRN.
The stories are organized into seven categories: cryptography, quantum
cryptography, data hiding, systems and software defenses, Internet
vulnerabilities, privacy protection, and physical security.
|
TRN's
Making the Future reports contain live links, and can
be read on a computer, printed and archived.
Buy the
the Security
report for $89.
.
You will receive download instructions via
email.
|
Report
Sections
|
Executive
Summary:
319
words
Main Report:
4,294
words
How It Works:
1,016
words
In-Depth Stories:
33
stories, including 6 images
|
|
Table of Contents:
Main Report
Knowing
Whos Who
Data, systems and objects
Keeping secrets
Scrambling well
Cracking codes
DNA computers
Quantum computers
Quantum Cryptography
Splitting up the secret
Hiding data in plain sight
Finding hidden data
Securing systems
Recovering from an attack
Securing the Net
Exploiting the Internet
Privacy
Protecting property
High visibility
Biometrics
Perpetually pursuing perfect security
|
How It Works
Two sides
of cryptography
Computing security
Security in probabilities
Quantum cryptography
Boosting privacy
In-Depth Story Categories
Cryptography
Quantum cryptography
Data hiding
Systems and software defenses
Internet vulnerabilities
Privacy protection
Physical security
|
Take
a look at all
available Making the Future reports.
View a four-page sample of the Making
the Future report (pdf).
|