What is COMSEC (communications security)?

<p>Communications security (COMSEC) is the prevention of unauthorized access to <a href=”https://www.techtarget.com/searchnetworking/definition/telecommunications-telecom”>telecommunications</a> traffic or to any written information that is transmitted or transferred. There are several COMSEC disciplines, including the following:</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<ul class=”default-list”>
<li><b>Cryptographic security. </b><a href=”https://www.techtarget.com/searchsecurity/opinion/Understanding-the-importance-of-data-encryption”>Encrypts data and renders it unreadable</a> until the data is decrypted.</li>
<li><b>Emission security. </b>Prevents the release or capture of electrical or electromagnetic emanations from hardware to defend against unauthorized interception of information or data.</li>
<li><b>Physical security.</b> Protects equipment, facilities and other infrastructure from unauthorized access, theft and damage.</li>
<li><b>Transmission security. </b>Prevents the interception or disruption of any transmissions occurring over a communications network.</li>
</ul>
<p>Information technology organizations across all verticals worldwide use these practices to secure their communications. However, the term <i>COMSEC</i> is largely used by the U.S. military and U.S. government.</p>
<p>The U.S. Department of Defense depends extensively on COMSEC practices to safeguard wired, wireless and space communications systems to maintain the nation’s defensive posture. Similarly, the U.S. <a href=”https://www.techtarget.com/searchsecurity/definition/National-Security-Agency”>National Security Agency</a> is also a major user of COMSEC cryptographic equipment and technologies as well as a developer of <a href=”https://www.techtarget.com/searchsecurity/feature/Cryptography-basics-Symmetric-key-encryption-algorithms”>cryptographic algorithms</a>.</p>
<section class=”section main-article-chapter” data-menu-title=”Why is COMSEC important?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″&g

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: