Für diesen Artikel ist leider kein Bild verfügbar.

Secure Communications – Applications and Management

RJ Sutton (Autor)

Software / Digital Media
346 Seiten
2002
John Wiley & Sons Inc (Hersteller)
978-0-470-84599-8 (ISBN)
163,74 inkl. MwSt
  • Keine Verlagsinformationen verfügbar
  • Artikel merken
This book explores the practicalities of secure voice communication management. The author discusses various communication mediums, highlighting their technical aspects and their security risks. Readers will also find solutions to the problems facing the security systems designer, buyer, or manager.
If you need to know more about communication's security management, this is the perfect book for you...Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
Explains the practical links between cryptography and telecommunications Addresses the pertinent issues of implementation of cryptography as a method of protecting information Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on...

Libraries, Graduate students, researchers and design engineers in telecom industry

Preface Acknowledgement Glossary Acronyms and Abbreviations 1. Threats and Solutions The Technical Threats to Communications Security Authentication Confidentiality Integrity Availability Compromising Emanation/Tempest Threats 2. An Introduction to Encryption and Security Management Analogue Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management Evaluating Encryption Equipment 3. Voice Security in Military Applications Analogue Encryption of Naval Long range, HF Radio Communications Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated Cipher Module 4. Telephone Security Specific Threats to Telephone Operations Network Technologies Telephone Security Solutions Key and Access Management Network Implementation Key Distribution Summary 5. Secure GSM Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom Security for GSM Users Key Management and Tools GRPS General Packet Radio Systems 6. Security in Private VHF/UHF Radio Networks Applications and Features Threats Countermeasures Communications Network Design and Architecture Hardware Components and Functions Security and Key Management Other Security Features 7. Electronic Protection Measures - Frequency Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM) Military Applications Network Architecture and Management Characteristics of Frequency Hopping Networks Key/Data Management and Tools Hardware components 8. Link and Bulk Encryption Basic Technology of Link Encryption The Ciphering Process Cryptographic Parameters Key and Network Management Military Link Security 9. Secure Fax Networks Basic Facsimile Technology Manual/Automatic Key Selection Network Architecture Key Management and Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks Implementation of Solutions Access Protection Boot-up Protection by On-Board Hardware with Smart Card LAN Security Model Application of PC Security System Administration 11. Secure E-mail The E-mail Scenario Threats Type and Motivation of Attackers Methods of Attack Countermeasures Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario Definition VPN Protocols Packet Header Formats Security Association List Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures Attacks within the Public Network 13. Military Data Communication Applications Data Terminals and their Operating Features Technical Parameters Security Management Key Management Combat Packet Data Networks 14. Managment, Support and Training Environments of Security Management Infrastructure and Planning Operational Hierarchies Training Customer Support Troubleshooting References Index

Erscheint lt. Verlag 24.4.2002
Verlagsort New York
Sprache englisch
Maße 182 x 254 mm
Gewicht 768 g
Themenwelt Technik Elektrotechnik / Energietechnik
ISBN-10 0-470-84599-6 / 0470845996
ISBN-13 978-0-470-84599-8 / 9780470845998
Zustand Neuware
Haben Sie eine Frage zum Produkt?