Encryption Made Simple for Lawyers
Encryption Made Simple for Lawyers
Click to enlarge
Author(s): Nelson, Sharon D.
Ries, David G.
ISBN No.: 9781634250580
Pages: 240
Year: 201601
Format: Trade Paper
Price: $ 96.53
Status: Out Of Print

About the Authors. xiAcknowledgments. xvPreface. xviiChapter 1 Introduction to the Amazing World of Encryption 1Secret Decoder Ring. 2Basic Terms. 2Goal of Encryption. 3History. 3Hieroglyphics.


4Substitution Ciphers. 4Scytale Cipher. 5Caesar Cipher. 5Vigenère Cipher. 6Jefferson Disk. 7Zimmerman Telegraph. 8Enigma. 9Indian Code Talkers.


10Historical Footnotes (just for fun). 10Modern Day. 10Chapter 2 Encryption and a Lawyer''s Duty to Safeguard Information 13Ethics Rules. 14Ethics Opinions. 17Ethics Rules--Electronic Communications. 20Ethics Opinions--Electronic Communications. 21Common Law Duties. 24Laws and Regulations Covering Personal Information.


24Summary of Duties. 27Information Security Basics. 28Encryption and Reasonable Safeguards. 29Mobile Devices. 29E-mail. 30Conclusion. 32Chapter 3 Why is Encryption So Important for Lawyers? 33Data Breaches Have Proliferated!. 34The Painful Costs of Data Breaches.


37The Ethical Duties of Lawyers are Changing with Technology. 38Who is the Real Threat?. 42Encryption is Part of the Security Process. 43Chapter 4 The Basics of Encryption Technology(Some Tech Stuff You May Want to Know) 47The Encryption Process. 48Encryption Algorithms. 56Authentication, Integrity, and Nonrepudiation. 57Backup and Key Recovery. 59Conclusion.


60Chapter 5 Encrypting Laptops, Desktops, and Servers 63Disk Encryption Basics. 65Encryption in Operating Systems. 67Windows. 67Apple OS X. 70Contents viiEncryption Software. 71Laptops. 72Desktops. 73Servers.


73Enterprise Management. 73Conclusion. 75Chapter 6 Encryption for Smartphones and Tablets 77Secure Setup. 78iPhones. 80iPads . 81Android. 82BlackBerry. 84Windows.


84Mobile Device Management. 85Encrypted Compartment for Law Firm Data. 86Conclusion--Using the "No-Brainer" Solution. 86Chapter 7 Encrypting Portable Drives 87Encrypted USB Flash Drives. 88Encrypted External Hard Drives. 92Operating System Encryption of Portable Drives. 93Encryption Software. 93Enterprise Management.


94Conclusion. 94Chapter 8 Network Communications 95WEP. 96WPA. 98WPA2. 99Using Wireless Networks. 101Secure Socket Layer. 103TLS . 106Link Encryption.


107End-to.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...