Communications security/Related Articles
Jump to navigation
Jump to search

- See also changes related to Communications security, or pages that link to Communications security or to this page or whose text contains "Communications security".
Parent topics
- Security [r]: The definition of resources to be protected and the users authorized to use them, and the policies and technical measures to enforce that restricted use [e]
- Telecommunications network [r]: A system of end user devices, transmission media, and intermediate relays, through which end users communicate using parts of the electromagnetic spectrum. [e]
- Radio [r]: Transmission and reception of information, which can be voice, data or imagery over electromagnetic radiation in free space (i.e., wireless). The information is modulated onto a carrier wave [e]
- Telephone [r]: Telecommunications device that transmits and receives sound, most commonly the human voice, by converting the sound waves to pulses of electrical current, and then retranslating the current back to sound. [e]
- Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]
Subtopics
Transmission security
- Frequency agility [r]: The capability of a set of electromagnetic receivers and transmitters to change, rapidly, their operating frequencies, possibly under the control of pseudo-random, network-synchronized frequency selection software [e]
- Spread spectrum [r]: A communications technique in which the information to be transmitted travels redundantly over multiple channels (e.g., frequencies, time slots), the number and identity of which may change. It provides greater immunity to noise and electronic attack, makes it harder to intercept, and can increase capacity of a shared medium. [e]
- Signals intelligence [r]: the practice of acquiring information through monitoring the electromagnetic signals deliberately trasmitted by an opponent, including communications (COMINT) and non-communications electronics such as radar (ELINT). [e]
- Direction finding [r]: Finding the location of an electromagnetic emitter, either by the crossed bearings from directional antennas from various known points, or by time of arrival or time difference of arrival of the signal at those points [e]
- Measurement and signature intelligence [r]: A variety of intelligence gathering disciplines complementary to the technical "mainstream" of imagery intelligence and signals intelligence. [e]
- TEMPEST [r]: Add brief definition or description
- Operation RAFTER [r]: A measurement and signature intelligence (MASINT) technique that allowed a remote monitor to determine, passively, the frequency to which a radio receiver was tuned; revelation of the technique allowed it to be prevented [e]
- HIJACK (code word) [r]: An unconfirmed intelligence collection technique, mixing aspects of signals intelligence and radiofrequency MASINT, in which a sensitive information signal inadvertently modulates an analog signal in its immediate vicinity, and the signal is extracted from a radiated or conducted analog carrier signal [e]
- NONSTOP (code word) [r]: An unconfirmed intelligence collection technique, mixing aspects of signals intelligence and radiofrequency MASINT, in which a sensitive information signal inadvertently modulates a digital device in its immediate vicinity, and the signal is extracted from a radiated or conducted digital carrier signal [e]
Content security
- Communications intelligence [r]: The subset of SIGINT concerned with signals intended to be intelligible to human beings, in the form of voice, messages, or images. [e]
- Traffic analysis [r]: Traffic analysis is a branch of signals intelligence, inferring useful information from messages without actually reading them. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]