1 |
communications security1. Measures and controls taken to deny unauthorized persons information derived from telecommunications and to ensure the authenticity of such telecommunications. Note: Communications security includes cryptosecurity, transmission security, emission security, and physical security of COMSEC material. [INFOSEC] · (a) cryptosecurity: [The] co [..]
|
2 |
communications securityRefers to the discipline/industry relating to protection of communications from unauthorised intelligible interception. The term is generally used to refer to telecommunications (voice, data and video), whether wired or wireless, digital or analogue. Protective controls include encryption, physical security and TEMPEST countermeasures.
|
3 |
communications securityAll measures (including the use of cryptographic security, transmission security, emission security and physical security measures) applied to protect government telecommunications from unauthorised interception and exploitation and to ensure the authenticity of such telecommunications.
|
4 |
communications securitycryptographic, transmission and emission security measures applied to information stored, processed or transmitted electronically; a subset of information technology security.
|
5 |
communications securityCommunications security (COMSEC) ensures the security of telecommunications confidentiality and integrity - two information assurance (IA) pillars. Generally, COMSEC may refer to the security of any i [..]
|
6 |
communications securityMeasures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study. This includes cryptosecurity, transmission security, emission security, and physical security of commun [..]
|
7 |
communications securityMeasures taken to deny unauthorized persons information derived from telecommunica-tions of the U.S. Government concerning national security, and to ensure the authenticity of such telecommunications. [..]
|
<< call set-up failure probability | call set-up time >> |