An toàn thông tin liên lạc - Secure Communications

346 416 0
An toàn thông tin liên lạc - Secure Communications

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

WILEYSERIES IN COMMUNICATIONSNETWORKING & DISTRIBUTEDSYSTEMS. Series Editor: David Hutchison, Lancaster University Series Advisers: Harmen van As, TU Vienna Serge Fdida, University of Paris Joe Sventek, Agilent Laboratories, Edinburgh The ‘Wiley Series inCommunications Networking &Distributed Systems’ is a series of expert-level, technically detailed books covering cutting-edge research and brand new developments in networking, middleware and software technologies for commu-nications and distributed systems. The books will provide timely, accurate and reliable information about the state-of-the-art to researchers and development engineers in the Telecommunications and Computing sectors. Other titles in the series: Wright: Voice over Packet Networks Jepsen: Java in Telecommunications

[...]... are reluctant to change them Today’s businessman or businesswoman is required to remember: † † † † † † † † † † † † Mobile phone access Mobile phone lock Mobile phone provider customer’s password Personal e-mail password and username (possibly numerous?) Bank ATM cash withdrawal password Credit-card PINs and passwords (numerous?) Office-door password Company e-mail password and username Company LAN access... maintain secure communications Churchill himself is reported to have been less than diligent when engaged in transatlantic ‘hotline’ discussions with President Roosevelt on a line duly tapped by the German eavesdroppers Even more dramatic was that despite having first-hand knowledge of code breaking successes of their own analysts, both the British and American forces were arrogant about their communications. .. this fascinating era of secure communications ? We should be aware that telecommunications are vulnerable to attack and that the threats to our communications are those to the Authentication, the Confidentiality, the Integrity and the Access to sensitive data and encryption devices This first chapter serves to elaborate on these defini- Threats and Solutions 3 tions, and the question of managing security... Remote LAN 10.2.4 Unauthorised Manipulation of Data Stored on a LAN 10.2.5 Eavesdropping on an Untrusted LAN or Public Network 10.2.6 Spoofing or Masquerading 10.2.7 Unauthorised Manipulation of Data During Transmission over a Public Network 10.2.8 Unauthorised Access to/Read Out of/Analysis of/Manipulation of/the Security System 10.2.9 ‘Brute-force’ Attack 10.2.10 Inefficient Security and Key Management... the compromising of Japanese ciphers Parallels can be drawn with the European theatre, for, in 1940–1941, the British mainland was in grave danger of being invaded and was under constant attack by the Luftwaffe The German initiative was grossly undermined by the fact that the Luftwaffe communications security was notoriously weak, and the ‘Battle of Britain’ ensued, with the German airforce being defeated,... technology continues to advance with great pace and momentum and as the technology expands, as do the threats to those communications There is a seemingly eternal battle taking place between those who wish to protect their communications lines and those who wish to invade them Between the cryptographer and the cryptanalyst and between the security manager and the intruder, as each side seeks to gain the... Figure 1.1 The components of cryptology Secure Communications 4 best and to implement those tactics by setting up an efficient infrastructure and formulating operational procedures that will maintain their network communications security The threats that exist are in both human and technical forms The latter is the subject of this chapter, with the problems involving human resources being treated in greater... the gargantuan and inspiring efforts of both Allied and Axis communications specialists alike, far from it It is rather an amazing fact, however, that ‘so much was read by so many’ during that era So astonishing were the analytical results of the British Commonwealth countries and the USA communications code breakers that it took some time for the fruits of their efforts to be both recognised and appreciated... far removed from the grand ideals of the strategic decision makers This book is aimed at providing a warning to those with their heads in the clouds and providing guidance to those who are given the task of implementing their strategies Secure Communications is essentially written in two parts and although some distinction is drawn between the technologies of voice and data communications, the two... but the answer to the question is the guide to what lengths should be taken to secure the user’s position Generally speaking, there are three levels of information security, i.e personal security, commercial security involving financial transactions and trade and high security, which encompasses national security, i.e political and military security Telecommunications technology continues to advance with . development engineers in the Telecommunications and Computing sectors. Other titles in the series: Wright: Voice over Packet Networks Jepsen: Java in Telecommunications Secure Communications Applications.

Ngày đăng: 10/06/2014, 23:41

Từ khóa liên quan

Mục lục

  • Secure Communications

    • Wiley Series in Communications Networking & Distributed Systems

    • Copyright

    • Contents

    • Preface

    • Glossary

    • Acronyms & Abbreviations

    • Ch1 Threats & Solutions

    • Ch2 Introduction to Encryption & Security Management

    • Ch3 Voice Security in Military Applications

    • Ch4 Telephone Security

    • Ch5 Secure GSM Systems

    • Ch6 Security in Private VHF/UHF Radio Networks

    • Ch7 Electronic Protection Measures--Frequency Hopping

    • Ch8 Link & Bulk Encryption

    • Ch9 Secure Fax Networks

    • Ch10 PC Security

    • Ch11 Secure E-mail

    • Ch12 Secure VPN

    • Ch13 Military Data Communications

    • Ch14 Management, Support & Training

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan