Communications security

Slides:



Advertisements
Similar presentations
Security Solutions Group
Advertisements

Physical Transmission Media 8 5/9/ Modified by: Brierley.
Direct Attacks on Computational Devices
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
UNCLASSIFIED1 COMSEC BRIEFING Having been selected to perform duties which will require access to classified COMSEC information, it is essential you be.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Lecture 1: Overview modified from slides of Lawrie Brown.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.
Unbounded media have network signals that are not bound by any type of fiber or cable; hence, they are also called wireless technologies Wireless LAN.
TRANSEC/EMSEC/ TEMPEST Artur Zak CS 996 – Information Security Management March 30, 2005.
1 Part II: Data Transmission The basics of media, signals, bits, carriers, and modems Fall 2005 Qutaibah Malluhi Computer Science and Engineering Qatar.
ECE537/7 #1Spring 2009 © , Richard A. Stanley ECE537 Advanced and High Performance Networks 7: TEMPEST in a Network (or a teapot?) Professor Richard.
Current research work and plans Zbigniew M. Jóskiewicz Wroclaw University of Technology Institute of Telecommunication and Acoustics Wybrzeże Wyspiańskiego.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
Chapter 15 Emission Security. Introduction Emissions Security (Emsec) Tempest defenses Stray RF emitted by Electronics Power Analysis Set back Smart Card.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Chapter 20: Network Security Business Data Communications, 4e.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
Copyright CCNA 1 Chapter 4, Part 1 Cable Testing By Your Name.
Tunisia, April 2015 “Homologation Procedures & Type Approval Testing for Mobile Terminals for ARB Region” Presented by: Mr Zied SALHI.
CCNA 1 Module 4: Cable Testing.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Chapter 4:Transmission Media 1 Basic Idea 2 Transmission media 3 Copper wires 4 Glass fibers 5 Radio 6 Microwave 7 Infrared 8 Laser 9 Choosing a medium.
WXET1143 Lecture2: Basic Communication. Communication using electricity  Since electricity was discovered, scientist have researched on ways to use the.
Communication channels and transmission media
Physical Transmission
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Telecommunications and wireless FAQ (VVSG & VSS2002)
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Implementations  Ethernet Networks  Wireless Networks.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Overview of Key Security Concepts and Vocabulary This Document was Funded by the National Science Foundation Federal Cyber Service Scholarship For Service.
Physical Transmission
Introduction to Network (c) Nouf Aljaffan
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Bits (0s and 1s) need to be transmitted from one host to another. Each bit is placed on the cable as an electrical signal or pulse. On copper cable the.
WIFI. What is wifi ? Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
FUNDAMENTALS OF NETWORKING
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Zahoor Ahmed J.P.Cances V.Meghdadi Cryptographic Spread Spectrum Relay Communication NGMAST 2008.
P.73#21 a.C=($2.35n + $500)/n b.C approaches $2.35 c.$3› ($2.35n + $500)/n 3n – 2.35n › n › 500 n › 500/0.65 n › 769 chips must be made in order.
BY: NICK DOWNER TEMPEST EMISSIONS. OVERVIEW What are tempest emissions? Detecting tempest emissions Security concerns How to protect against leakage.
Transmission Media The transmission medium is the physical path by which a message travels from sender to receiver. Computers and telecommunication devices.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Submitted by: Himanshi Sharma(IV yr.IT,Sec-a).  The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York.
Standards and Regulations Team Daedalus. Standards and Regulations 1.FCC – Part 15 2.Advanced Encryption Standard Description Prescriptions and Standards.
Transmission Media (Coaxial Cable and Twisted Pair) Khaled Al Otaishan
NET 311 Information Security
ROHIT RAJ TEMPEST AND ECHELON A SEMINAR BY ROLL NO VII TH SEM
Bluetooth.
Security in SDR & cognitive radio
Security in Wide Area Networks
Lecture 36.
Lecture 36.
Presentation transcript:

Communications security Dr.Talal Alkharobi

Communications security (COMSEC) Measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications.

Communications security (COMSEC) Communications security includes cryptosecurity, transmission security, emission security, traffic-flow security physical security of COMSEC equipment.

cryptosecurity The component of communications security that results from the provision of technically sound cryptosystems and their proper use. This includes insuring message confidentiality and authenticity.

Traffic-flow security The use of measures that conceal the presence and properties of valid messages on a network to prevent traffic analysis. This can be done by operational procedures or by the protection resulting from features inherent in some cryptographic equipment.

Traffic-flow security Techniques changing radio callsigns frequently encryption of a message's sending and receiving addresses (codress messages) causing the circuit to appear busy at all times or much of the time by sending dummy traffic sending a continuous encrypted signal, whether or not traffic is being transmitted.

Transmission security (TRANSEC) Protect transmissions from interception and exploitation by means other than cryptanalysis. Examples are frequency hopping and spread spectrum

Transmission security (TRANSEC) security include: Low probability of interception Low probability of detection Antijam — resistance to jamming

Emission security (EMSEC) Protection resulting from all measures taken to deny unauthorized persons information of value which might be derived from intercept and analysis of compromising emanations from crypto-equipment, automated information systems (computers), and telecommunications systems.

Compromising emanations Unintentionial signals which, if intercepted and analyzed, disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment. Laboratory and field tests have established that such CE can be propagated through space and along nearby conductors.

Compromising emanations Compromising emanations consist of electrical or acoustical energy unintentionally emitted by any of a great number of sources within equipment/systems which process information. This energy may relate to the original message, or information being processed, in such a way that it can lead to recovery of the plaintext.

Compromising emanations The interception/propagation ranges and analysis of such emanations are affected by a variety of factors, the functional design of the information processing equipment; system/equipment installation; environmental conditions related to physical security and ambient noise.

Compromising emanations The term "compromising emanations" rather than "radiation" is used because the compromising signals can, and do, exist in several forms such as magnetic and/or electric field radiation, line conduction, or acoustic emissions.

TEMPEST Codename referring to investigations and studies of compromising emanations (CE). It is often used broadly for the entire field of Emission Security (EMSEC). Has been variously reported as standing for "Transient ElectroMagnetic Pulse Emanation STandard“ "Telecommunications Electronics Material Protected from Emanating Spurious Transmissions."

TEMPEST certification The NSA-USA publishes lists of labs approved for TEMPEST testing and equipment that has been certified. The United States Army has a TEMPEST testing facility, as part of the U.S. Army Information Systems Engineering Command Similar lists and facilities exist in other NATO countries.

TEMPEST certification Certificates must apply to entire systems, not just to individual components, since connecting a single unshielded component (such as a cable) to an otherwise secure system could easily make it radiate dramatically more RF signal. Users who must specify TEMPEST certification could pay much higher prices, for obsolete hardware, and be severely limited in the flexibility of configuration choices available to them. A less-costly approach is to place the equipment in a fully shielded room.