Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • {{r|Communications Security Establishment}} {{r|Government Communications Security Bureau}}
    379 bytes (41 words) - 18:24, 31 January 2009
  • The combination of [[computer security]], [[communications security]], [[auditing]] and administrative controls such as physical security and p
    234 bytes (24 words) - 14:55, 26 February 2010
  • {{r|Communications security}} {{r|Communications Security Establishment}}
    844 bytes (96 words) - 14:48, 4 April 2024
  • {{r|Communications Security Establishment}} {{r|Government Communications Security Bureau}}
    1 KB (167 words) - 14:14, 6 April 2024
  • ...r sometimes '''information security''', is a broad term that includes both communications security and computer security, along with the appropriate administrative infrastruc ==Communications security==
    2 KB (232 words) - 16:21, 30 March 2024
  • The alphanumeric designation system for communications security (COMSEC) equipment under the control of the U.S. [[National Security Agency
    183 bytes (23 words) - 13:03, 23 March 2009
  • #REDIRECT [[Government Communications Security Bureau]]
    55 bytes (5 words) - 08:10, 15 September 2013
  • {{r|Communications security}}
    356 bytes (42 words) - 10:42, 3 September 2008
  • {{r|Communications Security Establishment}} {{r|Government Communications Security Bureau}}
    1 KB (173 words) - 14:49, 4 April 2024
  • The primary high-security [[cryptography|cryptographic]] [[communications security]] machine of [[Nazi Germany]]. Unknown to the Germans, it had been substant
    321 bytes (39 words) - 10:20, 14 June 2010
  • The Canadian government organization responsible for [[communications security]] and [[signals intelligence]]
    145 bytes (14 words) - 20:49, 6 August 2008
  • U.S. [[signals intelligence]] and [[communications security]] activity prior to major ground commitments
    140 bytes (16 words) - 09:49, 24 August 2008
  • {{r|Communications Security Establishment}} {{r|Government Communications Security Bureau}}
    2 KB (194 words) - 14:48, 4 April 2024
  • {{r|Communications security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • ...llection discipline. Like NSA, CSE is also responsible for government-wide communications security. Canada, however, does have a world-class [[intelligence analysis]] capabil
    2 KB (206 words) - 05:48, 8 April 2024
  • The Russian organization now responsible for [[signals intelligence]] and [[communications security]], but with some authority to do work under commercial contracts
    200 bytes (24 words) - 20:50, 6 August 2008
  • A wide-ranging replacement of conventional military [[radio]] and [[communications security]] equipment with [[software-defined radio]]
    171 bytes (17 words) - 21:29, 27 August 2008
  • ...ommunications Security Establishment]] (CSE), [[New Zealand]] [[Government Communications Security Bureau]] (GCSB), and the United States [[National Security Agency]] (NSA),
    2 KB (317 words) - 23:12, 8 August 2010
  • ...formation using simple technology and smart people, as well as sloppy U.S. communications security. <ref name=Fiedler>{{citation | title = Project touchdown: how we paid the price for lack of communications security in Vietnam - A costly lesson
    3 KB (424 words) - 13:06, 7 February 2011
  • ...ommunications Security Establishment]] (CSE), [[New Zealand]] [[Government Communications Security Bureau]] (GCSB), and the United States [[National Security Agency]] (NSA).
    3 KB (353 words) - 05:48, 8 April 2024
  • '''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to p
    650 bytes (95 words) - 16:22, 30 March 2024
  • ...r authentication, with optional features, which provide certain aspects of communications security#sequential integrity|sequential integrity.<ref name=RFC4302>{{citation ...ty Payload (ESP) protocol offers the same set of services, and also offers communications security#content confidentiality|content confidentiality.<ref name=RFC4303>{{citatio
    5 KB (761 words) - 16:22, 30 March 2024
  • {{r|Communications Security Establishment}}
    252 bytes (26 words) - 19:08, 3 July 2009
  • {{r|Communications security}}
    399 bytes (46 words) - 19:04, 28 February 2010
  • ...em (SINCGARS)''' is the name of a family of military radios and associated communications security equipment, principally used for ground-based, short-range communications fo
    3 KB (476 words) - 16:23, 30 March 2024
  • {{r|Communications Security Establishment}}
    3 KB (429 words) - 07:33, 18 March 2024
  • {{r|Communications Security Establishment}}
    1 KB (162 words) - 04:53, 31 May 2012
  • In computer and communications security dependent on [[public key infrastructure]] (PKI), a '''certification author
    646 bytes (92 words) - 05:48, 8 April 2024
  • {{r|Communications Security Establishment}} {{r|Government Communications Security Bureau}}
    3 KB (417 words) - 07:29, 24 April 2024
  • Most U.S. government-approved, in [[communications security]] (COMSEC) equipment has designations in the form '''TSEC/KG-99''', in wh | Removable communications security component
    3 KB (414 words) - 05:48, 8 April 2024
  • 7 KB (978 words) - 05:49, 8 April 2024
  • ===Communications Security Establishment (CSE)=== {{main|Communications Security Establishment}}
    8 KB (1,088 words) - 04:30, 21 March 2024
  • '''HAVE QUICK II''' is the name of a family of military radios and associated communications security equipment, principally used for aircraft, shipboard, satellite, and other a
    4 KB (694 words) - 16:22, 30 March 2024
  • ...bution system]], be [[encryption|encrypted]] into "BLACK" information by a communications security system, or both.
    4 KB (639 words) - 05:49, 8 April 2024
  • ...o-ground and air-to-air is ITU Frequency Bands|ultra-high frequency (UHF). Communications security devices now may be separate; reduction in the number of separate radio and
    2 KB (278 words) - 18:47, 3 April 2024
  • Computer and communications security mechanisms that depend on [[public key cryptography]] require confidence i
    2 KB (365 words) - 05:49, 8 April 2024
  • ...field use and designed to incorporate cryptography|encryption devices for communications security. These toll switches, in turn, could connect to the "international long dis
    3 KB (508 words) - 16:22, 30 March 2024
  • ...nt Communications Headquarters]], with functions similar to the Canadian [[Communications Security Establishment]] or the U.S. [[National Security Agency]].
    5 KB (854 words) - 05:49, 8 April 2024
  • More a part of communications security than true intelligence collection, SIGINT units still may have the responsi :# '''Communications security (COMSEC):''' "Friendly or enemy COMSEC breaches. Linkage of codes or codewo
    12 KB (1,821 words) - 06:04, 8 April 2024
  • ...d probably make the Japanese, who were generally overconfident about their communications security,<ref name=Kahn1996 /> believe their cryptosystem was secure. No operations
    6 KB (896 words) - 20:45, 2 April 2024
  • ...nications security#content confidentiality|content confidentiality]] and [[communications security#atomic integrity|atomic integrity]] to messages, but does not provide seque ...ecurity#sequential integrity|sequential integrity]], and may help ensure [[communications security#nonrepudiation |nonrepudiation]].
    12 KB (1,744 words) - 05:48, 8 April 2024
  • (temporary note) I really could use help on [[communications security]], which doesn't have metadata because I'm not happy with the title, which
    5 KB (780 words) - 19:42, 15 February 2009
  • ...ion]] although it has access to [[signals intelligence]] produced by the [[Communications Security Establishment]] and through close relationships with allies. A 2007 stateme
    14 KB (2,044 words) - 11:47, 2 February 2023
  • Communications security is provided by an external TSEC/KG-40 cryptography|encryptor. ==Electronic protection and communications security==
    14 KB (2,111 words) - 16:23, 30 March 2024
  • ...sponsibilities were more diverse than those of NSA or GCHQ, which design [[communications security]] systems and provide keying material. FAPSI also operated government secur In the US, both communications security and COMINT policies have been evolving, some with challenges. The adoption
    21 KB (2,986 words) - 06:04, 8 April 2024
  • ...kable [[one-time pad]]s for the traffic, some of their operations violated communications security rules and reused some of the pads. This reuse caused the vulnerability that ...tablished a network of radio systems, still transmitting with only minimal communications security.
    25 KB (3,805 words) - 22:34, 14 June 2009
  • :*[[ #Communications security | Communications security]] (COMSEC) ==Communications Security==
    33 KB (4,818 words) - 12:10, 20 March 2024
  • | book = Proceedings of the Second ACM Conference on Computer and Communications Security ...lia's [[Defence Signals Directorate]] (DSD) and New Zealand's [[Government Communications Security Bureau]] (GCSB). Each country maintains some monitoring stations on its ter
    20 KB (2,946 words) - 05:49, 8 April 2024
  • Replacing a wide range of military radios and communications security devices is the '''Joint Tactical Radio System (JTRS),''' (pronounced "jitte
    13 KB (1,859 words) - 16:22, 30 March 2024
  • ...part. In addition, it provides the engineering support for information and communications security programs appropriate for the unit and its area of operations. ...ions-Electronics works out the detailed Information Security (INFOSEC) and Communications Security (COMSEC) doctrine, in compliance with policies set by higher headquarters.
    29 KB (4,252 words) - 07:36, 18 March 2024
  • ...nded to be separate in the various theaters of the '''Second World War'''. Communications security, on the part of the Allies, was more centralized. Given that there were th ...g in China and Manchuria since the 1930s. They were overconfident in their communications security. <ref name=Kahn1996>{{cite book
    23 KB (3,456 words) - 18:47, 3 April 2024
  • ...formation using simple technology and smart people, as well as sloppy U.S. communications security. <ref name=Fiedler>{{citation | title = Project touchdown: how we paid the price for lack of communications security in Vietnam - A costly lesson
    24 KB (3,782 words) - 01:05, 8 April 2024
  • [[Covert channel]]s are deliberate means to elude communications security<ref>{{cite web
    36 KB (5,247 words) - 05:49, 8 April 2024
  • :#Communications security (COMSEC)
    42 KB (6,092 words) - 04:31, 21 March 2024
  • * [[Communications security/Definition]]
    28 KB (2,875 words) - 16:19, 7 April 2024
  • * [[Communications security/Related Articles]]
    36 KB (4,044 words) - 16:22, 7 April 2024
  • ...the way up to secure mobile communications. In many situations, by adding communications security features to the military sites, a new or upgraded telephone system, includi
    47 KB (7,180 words) - 07:29, 18 March 2024
  • * [[Template:Communications security/Metadata]]
    39 KB (4,231 words) - 05:22, 8 April 2024
  • ...EC), a [[counterintelligence]] function within government that goes beyond communications security. ...cially in a [[compartmented control system]], as used for intelligence and communications security information.
    72 KB (10,689 words) - 05:49, 8 April 2024
  • NSA observed patterns of communications security changes that, when taken together, indicated increased preparedness for som
    35 KB (5,549 words) - 20:45, 2 April 2024
  • ...working for his own Service A, but Service B has somehow managed what, in communications security, is called a man-in-the-middle attack. Service A believes it is in contact
    60 KB (9,516 words) - 04:30, 21 March 2024
  • ...ogress. At least one report reached Churchill. The Germans imposed greater communications security and this source dried up. Remember that the Germans themselves had not dec
    29 KB (4,288 words) - 14:27, 29 March 2024
  • ...d not share a secret key in order to communicate securely. When used for [[communications security#content confidentiality|content confidentiality]], the ''public key'' is ty
    52 KB (8,332 words) - 05:49, 8 April 2024
  • A separate SIGINT and communications security organization, or Service Cryptologic Element (SCE), existed for the US Army ...h service branch for SIGINT is not unheard of; "NSA’s Canadian cousin, the Communications Security Establishment (CSE) relies entirely upon the Canadian Forces Supplementary
    74 KB (11,149 words) - 11:11, 4 April 2024
  • ...the first warning of the actual attack would be exploding bombs. Poor U.S. communications security, as well as Soviet intelligence ships in international waters near the main
    22 KB (3,413 words) - 15:53, 4 April 2024
  • ...lete it unless, in my qualified opinion, it's flatly wrong. In the area of communications security, for example, there are techniques that indeed make no sense in civilian ap
    66 KB (10,879 words) - 17:02, 5 March 2024