Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet.
Dorothy E. DenningI think most organizations have an interest in key recovery, at least with respect to stored data.
Dorothy E. DenningI don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions.
Dorothy E. DenningI favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
Dorothy E. Denning