Search results for "Telecommunication security"

showing 2 items of 2 documents

Construction of pseudo-random sequences from chaos

2002

CHAOS (operating system)Pseudorandom number generatorTheoretical computer scienceRandom number generationbusiness.industryTelecommunication securityCryptographybusinessMathematics2000 2nd International Conference. Control of Oscillations and Chaos. Proceedings (Cat. No.00TH8521)
researchProduct

Security of information in IT systems

2005

The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.

business.industrySocial engineering (security)Telecommunication securityInformation technologyEavesdroppingElectromagnetic emissionComputer securitycomputer.software_genreInformation protection policyInformation security managementSociologyTempestbusinesscomputerSPIE Proceedings
researchProduct