Communications security/Related Articles

From Citizendium
< Communications security
Revision as of 13:21, 23 June 2024 by Pat Palmer (talk | contribs) (Text replacement - "{{r|Measurement and signature intelligence}}" to "")
Jump to navigation Jump to search
This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Communications security.
See also changes related to Communications security, or pages that link to Communications security or to this page or whose text contains "Communications security".

Parent topics

  • Security [r]: The definition of resources to be protected and the users authorized to use them, and the policies and technical measures to enforce that restricted use [e]
  • Telecommunications network [r]: A system of end user devices, transmission media, and intermediate relays, through which end users communicate using parts of the electromagnetic spectrum. [e]
    • Radio [r]: Transmission and reception of information, which can be voice, data or imagery over electromagnetic radiation in free space (i.e., wireless). The information is modulated onto a carrier wave [e]
    • Telephone [r]: Telecommunications device that transmits and receives sound, most commonly the human voice, by converting the sound waves to pulses of electrical current, and then retranslating the current back to sound. [e]
  • Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]

Subtopics

Transmission security

  • Frequency agility [r]: The capability of a set of electromagnetic receivers and transmitters to change, rapidly, their operating frequencies, possibly under the control of pseudo-random, network-synchronized frequency selection software [e]
  • Spread spectrum [r]: A communications technique in which the information to be transmitted travels redundantly over multiple channels (e.g., frequencies, time slots), the number and identity of which may change. It provides greater immunity to noise and electronic attack, makes it harder to intercept, and can increase capacity of a shared medium. [e]

Content security

Other related topics