Communications security: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
No edit summary
mNo edit summary
 
(3 intermediate revisions by one other user not shown)
Line 1: Line 1:
{{subpages}}
{{PropDel}}<br><br>{{subpages}}
'''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements [[computer security]], which protects information in computers.
'''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements computer security, which protects information in computers.


Many of the same criteria of [[information assurance]] apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it &mdash; and anyone around it  &mdash; not just intercept its transmissions.
Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it &mdash; and anyone around it  &mdash; not just intercept its transmissions.[[Category:Suggestion Bot Tag]]

Latest revision as of 06:01, 31 July 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


Communications security (COMSEC) encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements computer security, which protects information in computers.

Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it — not just intercept its transmissions.