Statements (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Field of study
|
gptkbp:alsoKnownAs |
gptkb:COMSEC
|
gptkbp:appliesTo |
Data communications
Satellite communications Wireless communications Voice communications |
gptkbp:concerns |
Protection of information in communications
|
gptkbp:countermeasures |
Encryption
Authentication Shielding Frequency hopping Physical security controls |
gptkbp:example |
gptkb:TEMPEST_standards
Secure radio communications Secure telephones Use of encryption |
gptkbp:goal |
Ensure authenticity
Ensure availability Ensure confidentiality Ensure integrity Prevent unauthorized access to telecommunications |
gptkbp:governedBy |
Standards
Policies Procedures |
gptkbp:hasComponent |
Authentication protocols
Access control Key management Physical protection of communication equipment |
https://www.w3.org/2000/01/rdf-schema#label |
Communications Security
|
gptkbp:includes |
Physical security
Cryptographic security Emission security Transmission security |
gptkbp:regulates |
gptkb:National_Security_Agency_(NSA)
gptkb:Federal_Communications_Commission_(FCC) |
gptkbp:relatedTo |
Cybersecurity
Network security Information security |
gptkbp:standardizedBy |
gptkb:FIPS
gptkb:NIST gptkb:ISO/IEC_27001 |
gptkbp:threats |
Jamming
Eavesdropping Interception Man-in-the-middle attack Spoofing |
gptkbp:usedBy |
Government agencies
Military Corporations |
gptkbp:bfsParent |
gptkb:Government_Communications_Security_Bureau
gptkb:ComSec |
gptkbp:bfsLayer |
6
|