NOTICE: Citizendium is still being set up on its newer server, treat as a beta for now; please see here for more.
Citizendium - a community developing a quality comprehensive compendium of knowledge, online and free. Click here to join and contribute—free
CZ thanks our previous donors. Donate here. Treasurer's Financial Report -- Thanks to our content contributors. --

Communications security/Related Articles

From Citizendium, the Citizens' Compendium
Jump to: navigation, search
This article is a stub and thus not approved.
Main Article
Talk
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Communications security.
See also changes related to Communications security, or pages that link to Communications security or to this page or whose text contains "Communications security".

Parent topics

  • Security [r]: The definition of resources to be protected and the users authorized to use them, and the policies and technical measures to enforce that restricted use [e]
  • Telecommunications network [r]: A system of end user devices, transmission media, and intermediate relays, through which end users communicate using parts of the electromagnetic spectrum. [e]
    • Radio [r]: Transmission and reception of information, which can be voice, data or imagery over electromagnetic radiation in free space (i.e., wireless). The information is modulated onto a carrier wave [e]
    • Telephone [r]: Telecommunications device that transmits and receives sound, most commonly the human voice, by converting the sound waves to pulses of electrical current, and then retranslating the current back to sound. [e]
  • Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]

Subtopics

Transmission security

  • Frequency agility [r]: The capability of a set of electromagnetic receivers and transmitters to change, rapidly, their operating frequencies, possibly under the control of pseudo-random, network-synchronized frequency selection software [e]
  • Spread spectrum [r]: A communications technique in which the information to be transmitted travels redundantly over multiple channels (e.g., frequencies, time slots), the number and identity of which may change. It provides greater immunity to noise and electronic attack, makes it harder to intercept, and can increase capacity of a shared medium. [e]
  • Signals intelligence [r]: the practice of acquiring information through monitoring the electromagnetic signals deliberately trasmitted by an opponent, including communications (COMINT) and non-communications electronics such as radar (ELINT). [e]
  • Measurement and signature intelligence [r]: A variety of intelligence gathering disciplines complementary to the technical "mainstream" of imagery intelligence and signals intelligence. [e]
    • TEMPEST [r]: Add brief definition or description
    • Operation RAFTER [r]: A measurement and signature intelligence (MASINT) technique that allowed a remote monitor to determine, passively, the frequency to which a radio receiver was tuned; revelation of the technique allowed it to be prevented [e]
    • HIJACK (code word) [r]: An unconfirmed intelligence collection technique, mixing aspects of signals intelligence and radiofrequency MASINT, in which a sensitive information signal inadvertently modulates an analog signal in its immediate vicinity, and the signal is extracted from a radiated or conducted analog carrier signal [e]
    • NONSTOP (code word) [r]: An unconfirmed intelligence collection technique, mixing aspects of signals intelligence and radiofrequency MASINT, in which a sensitive information signal inadvertently modulates a digital device in its immediate vicinity, and the signal is extracted from a radiated or conducted digital carrier signal [e]

Content security

Other related topics