Protection of information leakage by channels telephone

Abstract

Introduction. The design rule requirements for abstracts and reports for participate in the International Scientific Technical Conference «Radio Engineering Field, Signals, Devices and Systems» or abbreviated REFSDS are presented at this paper. Requirements for document. The requirements for execution of text, formulas, tables and figures with examples of implementation are expounded. The examples of bibliographic records execution and abstracts are presented. Methods of counteraction to the unauthorized access. The characteristics of the known methods of detecting unauthorized connections to the subscriber telephone line, providing the confidentiality of telephone conversations, protecting from listening of apartments and prevention of the unauthorized use of telephone connection are given. Conclusions. The classification of threats of confidentiality violation in telephone communication channels is conducted and methodology for eliminating of unauthorized interception of information is proposed. The complex use of a number of the listed technical equipments allows to prevent the use of communication channels for the wire tapping and listening of apartments, through which they pass.

Authors and Affiliations

B. Tsybulyak

Keywords

Related Articles

Truncated estimating parameters of additive mixture of radio signal and kurtosis non-Gaussian noise

Introduction. Classical methods based on the use of Gaussian random signal model has its advantages and disadvantages. Therefore, Maximum Likelihood Method have not found wide implementation due to the high computational...

Modeling three-dimensional crystal-like structures

Characteristics and constructional features of three-dimensional photon crystal-like structures are shown. The analysis of the structures show of good agreement experimental and theoretical results.

Optimization criterial of model of the radio electronic device

The features of designing of radio electronic devices structural - optimized by method are considered. The basic functional - constructive characteristics of the device are submitted as system criterial of the equations,...

Expert estimation methods of radioelectronic tools consumer properties.

The application expedience and stages expert evaluation, the conditions of the expert method use, the composition of the expert commission requirements and the qualification of the expert criterions are considered. The d...

Helicon isolator transient studies

Introduction. Design of modern powerful transistor generators with external exitation in meter and decameter wave ranges requires maximum utilisation of the transistor power capabilities. Transistors have no margins on t...

Download PDF file
  • EP ID EP309111
  • DOI 10.20535/RADAP.2013.55.143-148
  • Views 77
  • Downloads 0

How To Cite

B. Tsybulyak (2013). Protection of information leakage by channels telephone. Вісник НТУУ КПІ. Серія Радіотехніка, Радіоапаратобудування, 0(55), 143-148. https://europub.co.uk/articles/-A-309111