U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Newtwork Security

NCJ Number
94570
Journal
Data Processing and Communications Security Volume: 8 Issue: 2 Dated: (November/December 1983) Pages: 26-30
Author(s)
Anonymous
Date Published
1983
Length
5 pages
Annotation
This article on computer network security examines cryptographic techniques, methods of controlling electronic emissions, optical communications links, and physical security for data communications equipment.
Abstract
After describing the general procedure for data encryption, which translates intelligible data into unintelligible form just prior to transmission and then reverses the process at a legitimate receiving terminal, the security features of various data transmission methods are described. These include fiber optics, which has the following inherent security features: (1) the light energy intercepted requires sophisticated processing to extract the desired information; (2) interruption of the signal by tapping is easy to detect; and (3) light energy does not leak electromagnetic radiation that can be captured and monitored. Optical laser links offer a high degree of security in that it is difficult to intercept the beam without detection. Also, shielding techniques can prevent electronic transmissions from being intercepted by unauthorized persons. The communications security checklist presented identifies some of the key issues to consider in establishing a security program aimed at protecting information and a communications system. The topics considered are technical surveillance methodology, information asset valuation, threat analysis, physical security, technical-surveillance-countermeasures surveys, electronic soundproofing, and encryption equipment evaluation.