Statements (52)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Field_of_study
|
| gptkbp:alsoKnownAs |
gptkb:COMSEC
|
| gptkbp:appliesTo |
Data communications
Satellite communications Wireless communications Voice communications |
| gptkbp:concerns |
Protection of information in communications
|
| gptkbp:countermeasures |
Encryption
Authentication Shielding Frequency hopping Physical security controls |
| gptkbp:example |
gptkb:TEMPEST_standards
Secure radio communications Secure telephones Use of encryption |
| gptkbp:goal |
Ensure authenticity
Ensure availability Ensure confidentiality Ensure integrity Prevent unauthorized access to telecommunications |
| gptkbp:governedBy |
Standards
Policies Procedures |
| gptkbp:hasComponent |
Authentication protocols
Access control Key management Physical protection of communication equipment |
| gptkbp:includes |
Physical security
Cryptographic security Emission security Transmission security |
| gptkbp:regulates |
gptkb:National_Security_Agency_(NSA)
gptkb:Federal_Communications_Commission_(FCC) |
| gptkbp:relatedTo |
Cybersecurity
Network security Information security |
| gptkbp:standardizedBy |
gptkb:FIPS
gptkb:NIST gptkb:ISO/IEC_27001 |
| gptkbp:threats |
Jamming
Eavesdropping Interception Man-in-the-middle attack Spoofing |
| gptkbp:usedBy |
Government agencies
Military Corporations |
| gptkbp:bfsParent |
gptkb:Government_Communications_Security_Bureau
gptkb:ComSec |
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
Communications Security
|