Communications security/Related Articles: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
Pat Palmer (talk | contribs) m (Text replacement - "{{r|Communications intelligence}}" to "") |
||
Line 20: | Line 20: | ||
{{r|NONSTOP (code word)||**}} | {{r|NONSTOP (code word)||**}} | ||
===Content security=== | ===Content security=== | ||
{{r|Traffic analysis||**}} | {{r|Traffic analysis||**}} | ||
{{r|Cryptography||**}} | {{r|Cryptography||**}} |
Latest revision as of 07:33, 26 August 2024
- See also changes related to Communications security, or pages that link to Communications security or to this page or whose text contains "Communications security".
Parent topics
- Security [r]: The definition of resources to be protected and the users authorized to use them, and the policies and technical measures to enforce that restricted use [e]
- Telecommunications network [r]: A system of end user devices, transmission media, and intermediate relays, through which end users communicate using parts of the electromagnetic spectrum. [e]
- Radio [r]: Transmission and reception of information, which can be voice, data or imagery over electromagnetic radiation in free space (i.e., wireless). The information is modulated onto a carrier wave [e]
- Telephone [r]: Telecommunications device that transmits and receives sound, most commonly the human voice, by converting the sound waves to pulses of electrical current, and then retranslating the current back to sound. [e]
- Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]
Subtopics
Transmission security
- Frequency agility [r]: The capability of a set of electromagnetic receivers and transmitters to change, rapidly, their operating frequencies, possibly under the control of pseudo-random, network-synchronized frequency selection software [e]
- Spread spectrum [r]: A communications technique in which the information to be transmitted travels redundantly over multiple channels (e.g., frequencies, time slots), the number and identity of which may change. It provides greater immunity to noise and electronic attack, makes it harder to intercept, and can increase capacity of a shared medium. [e]
- TEMPEST [r]: Add brief definition or description
- Operation RAFTER [r]: Add brief definition or description
- HIJACK (code word) [r]: An unconfirmed intelligence collection technique, mixing aspects of signals intelligence and radiofrequency MASINT, in which a sensitive information signal inadvertently modulates an analog signal in its immediate vicinity, and the signal is extracted from a radiated or conducted analog carrier signal [e]
- NONSTOP (code word) [r]: Add brief definition or description
Content security
- Traffic analysis [r]: Add brief definition or description
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Personnel Reliability Program [r]: Add brief definition or description
- Public key infrastructure [r]: Add brief definition or description
- Right to Financial Privacy Act [r]: U.S. legislation with the primary purpose of defining reasonable expectations of privacy of financial records, and situations where there are limits on privacy [e]