Communications security/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: {{subpages}} {{TOC|right}} ==Parent topics== {{r|Security}} {{r|Telecommunications network}} {{r|Radio||**}} {{r|Telephone||**}} {{r|Computer network}} ==Subtopics== ===Transmission secu...)
 
m (Text replacement - "{{r|Communications intelligence}}" to "")
 
(3 intermediate revisions by 2 users not shown)
Line 12: Line 12:
{{r|Frequency agility}}
{{r|Frequency agility}}
{{r|Spread spectrum}}
{{r|Spread spectrum}}
{{r|Signals intelligence}}
 
{{r|Direction finding||**}}
{{r|Direction finding||**}}
{{r|Measurement and signature intelligence}}
 
{{r|TEMPEST||**}}
{{r|TEMPEST||**}}
{{r|Operation RAFTER||**}}
{{r|Operation RAFTER||**}}
Line 20: Line 20:
{{r|NONSTOP (code word)||**}}
{{r|NONSTOP (code word)||**}}
===Content security===
===Content security===
{{r|Communications intelligence}}
 
{{r|Traffic analysis||**}}
{{r|Traffic analysis||**}}
{{r|Cryptography||**}}
{{r|Cryptography||**}}
==Other related topics==
==Other related topics==
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
==Articles related by keyphrases (Bot populated)==
{{r|Personnel Reliability Program}}
{{r|Public key infrastructure}}
{{r|Right to Financial Privacy Act}}

Latest revision as of 07:33, 26 August 2024

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Communications security.
See also changes related to Communications security, or pages that link to Communications security or to this page or whose text contains "Communications security".

Parent topics

  • Security [r]: The definition of resources to be protected and the users authorized to use them, and the policies and technical measures to enforce that restricted use [e]
  • Telecommunications network [r]: A system of end user devices, transmission media, and intermediate relays, through which end users communicate using parts of the electromagnetic spectrum. [e]
    • Radio [r]: Transmission and reception of information, which can be voice, data or imagery over electromagnetic radiation in free space (i.e., wireless). The information is modulated onto a carrier wave [e]
    • Telephone [r]: Telecommunications device that transmits and receives sound, most commonly the human voice, by converting the sound waves to pulses of electrical current, and then retranslating the current back to sound. [e]
  • Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]

Subtopics

Transmission security

  • Frequency agility [r]: The capability of a set of electromagnetic receivers and transmitters to change, rapidly, their operating frequencies, possibly under the control of pseudo-random, network-synchronized frequency selection software [e]
  • Spread spectrum [r]: A communications technique in which the information to be transmitted travels redundantly over multiple channels (e.g., frequencies, time slots), the number and identity of which may change. It provides greater immunity to noise and electronic attack, makes it harder to intercept, and can increase capacity of a shared medium. [e]

Content security

Other related topics

Articles related by keyphrases (Bot populated)