Communications security: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
No edit summary
imported>Howard C. Berkowitz
No edit summary
Line 1: Line 1:
{{subpages}}
'''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements [[computer security]], which protects information in computers.
'''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements [[computer security]], which protects information in computers.


Many of the same criteria of [[information assurance]] apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it  — not just intercept its transmissions.
Many of the same criteria of [[information assurance]] apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it  — not just intercept its transmissions.

Revision as of 11:20, 27 February 2010

This article is a stub and thus not approved.
Main Article
Discussion
Definition [?]
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Communications security (COMSEC) encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements computer security, which protects information in computers.

Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it — not just intercept its transmissions.