Secure Communications: Applications and ManagementISBN: 978-0-471-49904-6
Hardcover
346 pages
February 2002
This is a Print-on-Demand title. It will be printed specifically to fill your order. Please allow an additional 15-20 days delivery time. The book is not returnable.
|
Preface
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromising Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures -
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot-up Protection by On-Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E-mail
The E-mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E-mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromising Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures -
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot-up Protection by On-Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E-mail
The E-mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E-mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index