Communications security: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz No edit summary |
mNo edit summary |
||
(3 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{PropDel}}<br><br>{{subpages}} | ||
'''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements | '''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements computer security, which protects information in computers. | ||
Many of the same criteria of | Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it — not just intercept its transmissions.[[Category:Suggestion Bot Tag]] |
Latest revision as of 06:01, 31 July 2024
This article may be deleted soon. | ||
---|---|---|
Communications security (COMSEC) encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements computer security, which protects information in computers. Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it — not just intercept its transmissions. |