Fr. 209.00

Secure Communications - Applications and Management

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Roger J. Sutton is the author of Secure Communications: Applications and Management, published by Wiley. Klappentext If you need to know more about communication's security management, this is the perfect book for you......... Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments. * Explains the practical links between cryptography and telecommunications * Addresses the pertinent issues of implementation of cryptography as a method of protecting information * Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material * Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection * Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on.......... Zusammenfassung This book explores the practicalities of secure voice communication management. The author discusses various communication mediums, highlighting their technical aspects and their security risks. Readers will also find solutions to the problems facing the security systems designer, buyer, or manager. Inhaltsverzeichnis Preface Acknowledgement Glossary Acronyms and Abbreviations 1. Threats and Solutions The Technical Threats to Communications Security Authentication Confidentiality Integrity Availability Compromising Emanation/Tempest Threats 2. An Introduction to Encryption and Security Management Analogue Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management Evaluating Encryption Equipment 3. Voice Security in Military Applications Analogue Encryption of Naval Long range, HF Radio Communications Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated Cipher Module 4. Telephone Security Specific Threats to Telephone Operations Network Technologies Telephone Security Solutions Key and Access Management Network Implementation Key Distribution Summary 5. Secure GSM Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom Security for GSM Users Key Management and Tools GRPS General Packet Radio Systems 6. Security in Private VHF/UHF Radio Networks Applications and Features Threats Countermeasures Communications Network Design and Architecture Hardware Components and Functions Security and Key Management Other Security Features 7. Electronic Protection Measures - Frequency Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM) Military Applications Network Archit...

List of contents

Preface
 
Acknowledgement
 
Glossary
 
Acronyms and Abbreviations
 
1. Threats and Solutions
 
The Technical Threats to Communications Security
 
Authentication
 
Confidentiality
 
Integrity
 
Availability
 
Compromising Emanation/Tempest Threats
 
2. An Introduction to Encryption and Security Management
 
Analogue Scrambling
 
Algorithms
 
Goodbye DES, Hello DES
 
Fundamentals in Key Management
 
Evaluating Encryption Equipment
 
3. Voice Security in Military Applications
 
Analogue Encryption of Naval Long range, HF Radio Communications
 
Stand-alone Digital Cipher Units in Land-based Operations
 
Radio Integrated Cipher Module
 
4. Telephone Security
 
Specific Threats to Telephone Operations
 
Network Technologies
 
Telephone Security Solutions
 
Key and Access Management
 
Network Implementation
 
Key Distribution
 
Summary
 
5. Secure GSM Systems
 
The Basic GSM Architecture
 
Standard GSM Secuirty Features
 
Custom Security for GSM Users
 
Key Management and Tools
 
GRPS General Packet Radio Systems
 
6. Security in Private VHF/UHF Radio Networks
 
Applications and Features
 
Threats
 
Countermeasures
 
Communications Network Design and Architecture
 
Hardware Components and Functions
 
Security and Key Management
 
Other Security Features
 
7. Electronic Protection Measures - Frequency Hopping
 
Electronic Warfare (EW)
 
Electronic Protection Measures (EPM)
 
Military Applications
 
Network Architecture and Management
 
Characteristics of Frequency Hopping Networks
 
Key/Data Management and Tools
 
Hardware components
 
8. Link and Bulk Encryption
 
Basic Technology of Link Encryption
 
The Ciphering Process
 
Cryptographic Parameters
 
Key and Network Management
 
Military Link Security
 
9. Secure Fax Networks
 
Basic Facsimile Technology
 
Manual/Automatic Key Selection
 
Network Architecture
 
Key Management and Tools
 
Fax Over Satellite Links
 
10. PC Security
 
Security Threats and Risks
 
Implementation of Solutions
 
Access Protection
 
Boot-up Protection by On-Board Hardware with Smart Card
 
LAN Security
 
Model Application of PC Security
 
System Administration
 
11. Secure E-mail
 
The E-mail Scenario
 
Threats
 
Type and Motivation of Attackers
 
Methods of Attack
 
Countermeasures
 
Guidelines for E-mail Security
 
12. Secure Virtual Private Networks
 
Scenario
 
Definition VPN
 
Protocols
 
Packet Header Formats
 
Security Association List
 
Tunnel Table
 
Routing Tables
 
Packet Filtering
 
Threats and Countermeasures
 
Attacks within the Public Network
 
13. Military Data Communication
 
Applications
 
Data Terminals and their Operating Features
 
Technical Parameters
 
Security Management
 
Key Management
 
Combat Packet Data Networks
 
14. Managment, Support and Training
 
Environments of Security Management
 
Infrastructure and Planning
 
Operational Hierarchies
 
Training
 
Customer Support
 
Trou

Report

"...well-written and accessible..." (Electronics Communication Engineering Journal, December 2002)

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.