This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
The examples and perspective in this article deal primarily with the United States and do not represent a worldwide view of the subject. You may improve this article, discuss the issue on the talk page, or create a new article, as appropriate.(March 2014) (Learn how and when to remove this message)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Communications security" – news · newspapers · books · scholar · JSTOR(May 2023) (Learn how and when to remove this message)
(Learn how and when to remove this message)
Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications[1] in an intelligible form, while still delivering content to the intended recipients.
In the North Atlantic Treaty Organization culture, including United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes cryptographic security, transmission security, emissions security and physical security of COMSEC equipment and associated keying material.
COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.
Voice over secure internet protocol VOSIP has become the de facto standard for securing voice communication, replacing the need for Secure Terminal Equipment (STE) in much of NATO, including the U.S.A. USCENTCOM moved entirely to VOSIP in 2008.[2]
^Cite error: The named reference :0 was invoked but never defined (see the help page).
^USCENTCOM PL 117-02-1.
and 28 Related for: Communications security information
Communicationssecurity is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still...
The CommunicationsSecurity Establishment (CSE; French: Centre de la sécurité des télécommunications, CST), formerly (from 2008-2014) called the Communications...
Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and...
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communicationssecurity over a computer network. The protocol is widely...
The Government CommunicationsSecurity Bureau (GCSB; Māori: Te Tira Tiaki) is the public-service department of New Zealand charged with promoting New...
countries.[citation needed] In December 1995, Ylönen founded SSH CommunicationsSecurity to market and develop SSH. The original version of the SSH software...
intercept and decipher the communications of the Axis powers. When the war ended, the SIS was reorganized as the Army Security Agency (ASA), and it was...
revelation that the CommunicationsSecurity Establishment (CSE), without a warrant, used free airport Wi-Fi service to gather the communications of all travellers...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and CommunicationsSecurity. pp. 5–17. doi:10.1145/2810103.2813707. ISBN 9781450338325. S2CID 347988...
The badge of the CommunicationsSecurity Establishment is the main heraldic emblem of the CommunicationsSecurity Establishment (CSE). In response to a...
the term security kernel has the following meanings: In computer and communicationssecurity, the central part of a computer or communications system hardware...
Transmission security (TRANSEC) is the component of communicationssecurity (COMSEC) that results from the application of measures designed to protect...
on Computer and CommunicationsSecurity. CCS '19. ACM Digital Library, ACM SIGSAC Conference on Computer and CommunicationsSecurity. pp. 1–14. doi:10...
2007 paper to Proceedings of 14th ACM Conference on Computer and CommunicationsSecurity (CCS). It was closed in October 2014. Bot prevention Defense strategy...
signal intercept networks of the UK Government Communications Headquarters (GCHQ) and the US National Security Agency (NSA) at the beginning of the Cold War...
Zoom Video Communications, Inc. (commonly shortened to Zoom, and stylized as zoom) is a communications technology company headquartered in San Jose, California...
Forces Security Agency (AFSA), which became responsible for the direction and control of all US communications intelligence (COMINT) and communications security...
is easily broken and in modern practice offers essentially no communicationssecurity. The transformation can be represented by aligning two alphabets;...
In telecommunications, communications protection is the application of communicationssecurity (COMSEC) measures to telecommunications systems in order...
The Security Service, also known as MI5 (Military Intelligence, Section 5), is the United Kingdom's domestic counter-intelligence and security agency and...
Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance...
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies...
Besides intelligence gathering, it had responsibility for the security of Army communications and for electronic countermeasures operations. In 1977, the...
a need-to-know basis, primarily for intelligence roles in the CommunicationsSecurity Establishment, Canadian Armed Forces, and certain senior government...
David Mitnick (August 6, 1963 – July 16, 2023) was an American computer security consultant, author, and convicted hacker. He is best known for his high-profile...
the IETF's involvement, SFTP was a proprietary protocol of SSH CommunicationsSecurity, designed by Tatu Ylönen with assistance from Sami Lehtinen in...