Protection of information leakage by channels telephone
Journal Title: Вісник НТУУ КПІ. Серія Радіотехніка, Радіоапаратобудування - Year 2013, Vol 0, Issue 55
Abstract
Introduction. The design rule requirements for abstracts and reports for participate in the International Scientific Technical Conference «Radio Engineering Field, Signals, Devices and Systems» or abbreviated REFSDS are presented at this paper. Requirements for document. The requirements for execution of text, formulas, tables and figures with examples of implementation are expounded. The examples of bibliographic records execution and abstracts are presented. Methods of counteraction to the unauthorized access. The characteristics of the known methods of detecting unauthorized connections to the subscriber telephone line, providing the confidentiality of telephone conversations, protecting from listening of apartments and prevention of the unauthorized use of telephone connection are given. Conclusions. The classification of threats of confidentiality violation in telephone communication channels is conducted and methodology for eliminating of unauthorized interception of information is proposed. The complex use of a number of the listed technical equipments allows to prevent the use of communication channels for the wire tapping and listening of apartments, through which they pass.
Authors and Affiliations
B. Tsybulyak
Frequency modulated signal generation
Compound frequency modulated signal generation process with simple integrated direct digital synthesis microcircuit is presented starting DDS microcircuit choice, time and modulation characteristics analysis, interface u...
Reduction of systemotechnical complex model to a level of multielement physical system
Reduction method of systemotechnical complex (STC) model is propose for principal regularity elucidation of part in wholeness unification and analysis of components in STC interaction. The analysis of characters in STC o...
Wireless technologies of data transfer Wi-Fi, Bluetooth and ZigBee.
This paper describes Wireless technologies of data transfer: Wi-Fi, Bluetooth and ZigBee. There are comparison characteristics of these technologies and possible application area for these technologies.
Ultra wideband reflector antenna log-periodic feed with operating frequency range 1–20 GHz.
Results of modeling and optimization of electric characteristics of ultra wideband reflector antenna log-periodic feed, based on two log-periodic antennas array for operating over frequency range 1 -20 GHz, are presented...
Rationale for indicator quality of integrated information security system
The justification of index of functional quality of the system of informational security in structural departments of Government service of emergency situations of Ukraine is carried out. Basic parameters which can influ...