Communications security: Difference between revisions
Jump to navigation
Jump to search
John Leach (talk | contribs) m (Text replacement - "]]" to "") |
mNo edit summary |
||
Line 2: | Line 2: | ||
'''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements computer security, which protects information in computers. | '''Communications security (COMSEC)''' encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements computer security, which protects information in computers. | ||
Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it — not just intercept its transmissions. | Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it — not just intercept its transmissions.[[Category:Suggestion Bot Tag]] |
Latest revision as of 06:01, 31 July 2024
This article may be deleted soon. | ||
---|---|---|
Communications security (COMSEC) encompasses the policies, procedures and technologies used to protect information in transmission, whether that information be generated by computers or not. It complements computer security, which protects information in computers. Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC. For example, it can be critical, especially in military contexts, to conceal the location of a radio transmitter, because the enemy may try to destroy it — and anyone around it — not just intercept its transmissions. |