2. History of Control: The Mechanisms
Since World War II and the lessons learned from the difficult process of decrypting the Enigma and Purple machines, the Anglo-Saxon world has decided to establish controls over information technology, particularly cryptology. The so-called "Five Eyes" alliance (UKUSA Agreement ) was established in 1941 for this purpose.
Four overlapping phases were thus gradually implemented to maintain this oversight over time and adapt to both...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
History of Control: The Mechanisms
Article included in this offer
"Security of information systems"
(
89 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - FILIOL (E.) - Texte de l'audition devant la commission parlementaire « sécurité numérique et risques : enjeux et chances pour les entreprises ». - Dans Rapport 2541 (Assemblée Nationale)/271 (Sénat) – Tome II. Office Parlementaire d'Évaluation des Choix Scientifiques et Technologiques (OPECST), pp. 181–188 Paris (2015).
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!