Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Secure communication

Index Secure communication

Secure communication is when two entities are communicating and do not want a third party to listen in. [1]

81 relations: Adware, Android (operating system), Anonymity, Anonymizer, Anonymous P2P, Antivirus software, AT&T, Authentication, Backdoor (computing), Bandwidth (computing), Carnivore (software), Code, Code talker, Coherer, Communications security, Comparison of instant messaging clients, Comparison of VoIP software, Computer security, Countersurveillance, Crowds, Eavesdropping, ECHELON, Electronic Frontier Foundation, Email encryption, Encryption, End-to-end encryption, Faraday cage, Firewall (computing), Forward secrecy, Franklin D. Roosevelt, Freenet, Google, Hepting v. AT&T, I2P, Information-theoretic security, International mobile subscriber identity, Internet café, Internet Relay Chat, IP address, IPhone, Key size, Keystroke logging, Laser, Madison Square Garden, Mixminion, Mobile phone, National Security Agency, Nikola Tesla, NSA warrantless surveillance (2001–2007), One-time pad, ..., Opportunistic encryption, Payphone, Piggybacking (Internet access), Plaintext, Plausible deniability, Privoxy, Proxomitron, Radio control, Radio jamming, Routing, Secure instant messaging, Secure messaging, Secure Real-time Transport Protocol, Semaphore line, Signals intelligence, SIGSALY, Sound, Spyware, Steganography, Tempest (codename), Tor (anonymity network), Traffic analysis, Transport Layer Security, Triangulation, Trojan Horse, Trusted Computing, Voice over IP, White noise, Wi-Fi, Winston Churchill, ZRTP. Expand index (31 more) »

Adware

Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.

New!!: Secure communication and Adware · See more »

Android (operating system)

Android is a mobile operating system developed by Google, based on a modified version of the Linux kernel and other open source software and designed primarily for touchscreen mobile devices such as smartphones and tablets.

New!!: Secure communication and Android (operating system) · See more »

Anonymity

Anonymity, adjective "anonymous", is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness".

New!!: Secure communication and Anonymity · See more »

Anonymizer

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable.

New!!: Secure communication and Anonymizer · See more »

Anonymous P2P

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes or participants are anonymous or pseudonymous.

New!!: Secure communication and Anonymous P2P · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Secure communication and Antivirus software · See more »

AT&T

AT&T Inc. is an American multinational conglomerate holding company headquartered at Whitacre Tower in Downtown Dallas, Texas.

New!!: Secure communication and AT&T · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Secure communication and Authentication · See more »

Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology).

New!!: Secure communication and Backdoor (computing) · See more »

Bandwidth (computing)

In computing, bandwidth is the maximum rate of data transfer across a given path.

New!!: Secure communication and Bandwidth (computing) · See more »

Carnivore (software)

Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications.

New!!: Secure communication and Carnivore (software) · See more »

Code

In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form or representation, sometimes shortened or secret, for communication through a communication channel or storage in a storage medium.

New!!: Secure communication and Code · See more »

Code talker

Code talkers are people in the 20th century who used obscure languages as a means of secret communication during wartime.

New!!: Secure communication and Code talker · See more »

Coherer

The coherer was a primitive form of radio signal detector used in the first radio receivers during the wireless telegraphy era at the beginning of the 20th century.

New!!: Secure communication and Coherer · See more »

Communications security

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

New!!: Secure communication and Communications security · See more »

Comparison of instant messaging clients

Instant messaging was created in July 1996 by Yair Goldfinger, Arik Vardi, Sefi Vigiser, and Amnon Amir, when they started a company called Mirabilis in order to introduce a new way of communication over the Internet.

New!!: Secure communication and Comparison of instant messaging clients · See more »

Comparison of VoIP software

This is a comparison of voice over IP (VoIP) software used to conduct telephone-like voice conversations across Internet Protocol (IP) based networks.

New!!: Secure communication and Comparison of VoIP software · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Secure communication and Computer security · See more »

Countersurveillance

Countersurveillance refers to measures undertaken to prevent surveillance, including covert surveillance.

New!!: Secure communication and Countersurveillance · See more »

Crowds

This article refers to "a proposed anonymity network." For the psychological and sociological term referring to adolescent peer groups, see Crowds (adolescence).

New!!: Secure communication and Crowds · See more »

Eavesdropping

Eavesdropping is secretly or stealthily listening to the private conversation or communications of others without their consent.

New!!: Secure communication and Eavesdropping · See more »

ECHELON

ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the US with the aid of four other signatory nations to the UKUSA Security Agreement Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss".

New!!: Secure communication and ECHELON · See more »

Electronic Frontier Foundation

The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California.

New!!: Secure communication and Electronic Frontier Foundation · See more »

Email encryption

Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients.

New!!: Secure communication and Email encryption · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Secure communication and Encryption · See more »

End-to-end encryption

End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages.

New!!: Secure communication and End-to-end encryption · See more »

Faraday cage

A Faraday cage or Faraday shield is an enclosure used to block electromagnetic fields.

New!!: Secure communication and Faraday cage · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Secure communication and Firewall (computing) · See more »

Forward secrecy

In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances your session keys will not be compromised even if the private key of the server is compromised.

New!!: Secure communication and Forward secrecy · See more »

Franklin D. Roosevelt

Franklin Delano Roosevelt Sr. (January 30, 1882 – April 12, 1945), often referred to by his initials FDR, was an American statesman and political leader who served as the 32nd President of the United States from 1933 until his death in 1945.

New!!: Secure communication and Franklin D. Roosevelt · See more »

Freenet

Freenet is a peer-to-peer platform for censorship-resistant communication.

New!!: Secure communication and Freenet · See more »

Google

Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.

New!!: Secure communication and Google · See more »

Hepting v. AT&T

Hepting v. AT&T is a United States class action lawsuit filed in January 2006 by the Electronic Frontier Foundation (EFF) against the telecommunications company AT&T, in which the EFF alleges that AT&T permitted and assisted the National Security Agency (NSA) in unlawfully monitoring the communications of the United States, including AT&T customers, businesses and third parties whose communications were routed through AT&T's network, as well as voice over IP telephone calls routed via the Internet.

New!!: Secure communication and Hepting v. AT&T · See more »

I2P

The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer to peer communication.

New!!: Secure communication and I2P · See more »

Information-theoretic security

Information-theoretic security is a cryptosystem whose security derives purely from information theory.

New!!: Secure communication and Information-theoretic security · See more »

International mobile subscriber identity

The International Mobile Subscriber Identity or IMSI is used to identify the user of a cellular network and is a unique identification associated with all cellular networks.

New!!: Secure communication and International mobile subscriber identity · See more »

Internet café

An Internet café, also known as a cybercafé, is a place which provides Internet access to the public, usually for a fee.

New!!: Secure communication and Internet café · See more »

Internet Relay Chat

Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.

New!!: Secure communication and Internet Relay Chat · See more »

IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

New!!: Secure communication and IP address · See more »

IPhone

iPhone is a line of smartphones designed and marketed by Apple Inc. The iPhone line of products use Apple's iOS mobile operating system software.

New!!: Secure communication and IPhone · See more »

Key size

In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).

New!!: Secure communication and Key size · See more »

Keystroke logging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

New!!: Secure communication and Keystroke logging · See more »

Laser

A laser is a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation.

New!!: Secure communication and Laser · See more »

Madison Square Garden

Madison Square Garden, often called "MSG" or simply "The Garden", is a multi-purpose indoor arena in the New York City borough of Manhattan.

New!!: Secure communication and Madison Square Garden · See more »

Mixminion

Mixminion is the standard implementation of the Type III anonymous remailer protocol.

New!!: Secure communication and Mixminion · See more »

Mobile phone

A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.

New!!: Secure communication and Mobile phone · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: Secure communication and National Security Agency · See more »

Nikola Tesla

Nikola Tesla (Никола Тесла; 10 July 1856 – 7 January 1943) was a Serbian-American inventor, electrical engineer, mechanical engineer, physicist, and futurist who is best known for his contributions to the design of the modern alternating current (AC) electricity supply system.

New!!: Secure communication and Nikola Tesla · See more »

NSA warrantless surveillance (2001–2007)

NSA warrantless surveillance (also commonly referred to as "warrantless-wiretapping" or "-wiretaps") refers to the surveillance of persons within the United States, including United States citizens, during the collection of notionally foreign intelligence by the National Security Agency (NSA) as part of the Terrorist Surveillance Program.

New!!: Secure communication and NSA warrantless surveillance (2001–2007) · See more »

One-time pad

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent.

New!!: Secure communication and One-time pad · See more »

Opportunistic encryption

Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel, otherwise falling back to unencrypted communications.

New!!: Secure communication and Opportunistic encryption · See more »

Payphone

A payphone (alternative spelling: pay phone) is typically a coin-operated public telephone, often located in a telephone booth or a privacy hood, with pre-payment by inserting money (usually coins) or by billing a credit or debit card, or a telephone card.

New!!: Secure communication and Payphone · See more »

Piggybacking (Internet access)

Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge.

New!!: Secure communication and Piggybacking (Internet access) · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Secure communication and Plaintext · See more »

Plausible deniability

Plausible deniability is the ability of people (typically senior officials in a formal or informal chain of command) to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.

New!!: Secure communication and Plausible deniability · See more »

Privoxy

Privoxy is a free non-caching web proxy with filtering capabilities for enhancing privacy, manipulating cookies and modifying web page data and HTTP headers before the page is rendered by the browser.

New!!: Secure communication and Privoxy · See more »

Proxomitron

Proxomitron, the Universal Web Filter, is a filtering web proxy written by Scott R. Lemmon.

New!!: Secure communication and Proxomitron · See more »

Radio control

Radio control (often abbreviated to R/C or simply RC) is the use of radio signals to remotely control a device.

New!!: Secure communication and Radio control · See more »

Radio jamming

Radio jamming is the deliberate jamming, blocking or interference with authorized wireless communications.

New!!: Secure communication and Radio jamming · See more »

Routing

Routing is the process of selecting a path for traffic in a network, or between or across multiple networks.

New!!: Secure communication and Routing · See more »

Secure instant messaging

Secure instant messaging is a form of instant messaging.

New!!: Secure communication and Secure instant messaging · See more »

Secure messaging

Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry regulations such as HIPAA, GLBA and SOX.

New!!: Secure communication and Secure messaging · See more »

Secure Real-time Transport Protocol

The Secure Real-time Transport Protocol (SRTP) is a Real-time Transport Protocol (RTP) profile, intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both unicast and multicast applications.

New!!: Secure communication and Secure Real-time Transport Protocol · See more »

Semaphore line

A semaphore telegraph is a system of conveying information by means of visual signals, using towers with pivoting shutters, also known as blades or paddles.

New!!: Secure communication and Semaphore line · See more »

Signals intelligence

Signals intelligence (SIGINT) is intelligence-gathering by interception of signals, whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT).

New!!: Secure communication and Signals intelligence · See more »

SIGSALY

In cryptography, SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in World War II for the highest-level Allied communications.

New!!: Secure communication and SIGSALY · See more »

Sound

In physics, sound is a vibration that typically propagates as an audible wave of pressure, through a transmission medium such as a gas, liquid or solid.

New!!: Secure communication and Sound · See more »

Spyware

Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.

New!!: Secure communication and Spyware · See more »

Steganography

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.

New!!: Secure communication and Steganography · See more »

Tempest (codename)

TEMPEST is a National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.

New!!: Secure communication and Tempest (codename) · See more »

Tor (anonymity network)

Tor is free software for enabling anonymous communication.

New!!: Secure communication and Tor (anonymity network) · See more »

Traffic analysis

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted.

New!!: Secure communication and Traffic analysis · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Secure communication and Transport Layer Security · See more »

Triangulation

In trigonometry and geometry, triangulation is the process of determining the location of a point by forming triangles to it from known points.

New!!: Secure communication and Triangulation · See more »

Trojan Horse

The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war.

New!!: Secure communication and Trojan Horse · See more »

Trusted Computing

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group.

New!!: Secure communication and Trusted Computing · See more »

Voice over IP

Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

New!!: Secure communication and Voice over IP · See more »

White noise

In signal processing, white noise is a random signal having equal intensity at different frequencies, giving it a constant power spectral density.

New!!: Secure communication and White noise · See more »

Wi-Fi

Wi-Fi or WiFi is technology for radio wireless local area networking of devices based on the IEEE 802.11 standards.

New!!: Secure communication and Wi-Fi · See more »

Winston Churchill

Sir Winston Leonard Spencer-Churchill (30 November 187424 January 1965) was a British politician, army officer, and writer, who was Prime Minister of the United Kingdom from 1940 to 1945 and again from 1951 to 1955.

New!!: Secure communication and Winston Churchill · See more »

ZRTP

ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over Internet Protocol (VoIP) phone telephony call based on the Real-time Transport Protocol.

New!!: Secure communication and ZRTP · See more »

Redirects here:

Secure Communication, Securely communicate.

References

[1] https://en.wikipedia.org/wiki/Secure_communication

OutgoingIncoming
Hey! We are on Facebook now! »