Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Traffic analysis

Index Traffic analysis

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted. [1]

50 relations: Admiral of the Fleet (Royal Navy), Aircraft carrier, Alice and Bob, Anonymous remailer, Attack on Pearl Harbor, Auguste Kerckhoffs, Bandwidth (computing), Battle of Jutland, Bletchley Park, Brute-force attack, Call sign, Chatter (signals intelligence), Chūichi Nagumo, Command hierarchy, Communication, Communications security, Computer security, Consul (representative), Counterintelligence, Cryptanalysis, Data retention, Data warehouse, David Beatty, 1st Earl Beatty, Direction finding, ECHELON, Encryption, Free Haven Project, Harry Hinsley, Hidden Markov model, Imperial Japanese Navy, Internet service provider, Invasion of Normandy, Military intelligence, Norway, Onion routing, Operation Quicksilver (deception plan), Pas-de-Calais, Password, Pattern-of-life analysis, Reinhard Scheer, Room 40, Secure Shell, Signaling (telecommunications), Signals intelligence, Social network analysis, Tor (anonymity network), Traffic, World War I, World War II, Zendian problem.

Admiral of the Fleet (Royal Navy)

Admiral of the Fleet is a five-star naval officer rank and the highest rank of the British Royal Navy.

New!!: Traffic analysis and Admiral of the Fleet (Royal Navy) · See more »

Aircraft carrier

An aircraft carrier is a warship that serves as a seagoing airbase, equipped with a full-length flight deck and facilities for carrying, arming, deploying, and recovering aircraft.

New!!: Traffic analysis and Aircraft carrier · See more »

Alice and Bob

Alice and Bob are fictional characters commonly used as placeholder names in cryptology, as well as science and engineering literature.

New!!: Traffic analysis and Alice and Bob · See more »

Anonymous remailer

An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from.

New!!: Traffic analysis and Anonymous remailer · See more »

Attack on Pearl Harbor

The attack on Pearl Harbor was a surprise military strike by the Imperial Japanese Navy Air Service against the United States naval base at Pearl Harbor, Hawaii Territory, on the morning of December 7, 1941.

New!!: Traffic analysis and Attack on Pearl Harbor · See more »

Auguste Kerckhoffs

Auguste Kerckhoffs (19 January 1835 – 9 August 1903) was a Dutch linguist and cryptographer who was professor of languages at the École des Hautes Études Commerciales in Paris in the late 19th century.

New!!: Traffic analysis and Auguste Kerckhoffs · See more »

Bandwidth (computing)

In computing, bandwidth is the maximum rate of data transfer across a given path.

New!!: Traffic analysis and Bandwidth (computing) · See more »

Battle of Jutland

The Battle of Jutland (Skagerrakschlacht, the Battle of Skagerrak) was a naval battle fought by the British Royal Navy's Grand Fleet under Admiral Sir John Jellicoe, against the Imperial German Navy's High Seas Fleet under Vice-Admiral Reinhard Scheer during the First World War.

New!!: Traffic analysis and Battle of Jutland · See more »

Bletchley Park

Bletchley Park was the central site for British (and subsequently, Allied) codebreakers during World War II.

New!!: Traffic analysis and Bletchley Park · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Traffic analysis and Brute-force attack · See more »

Call sign

In broadcasting and radio communications, a call sign (also known as a call name or call letters—and historically as a call signal—or abbreviated as a call) is a unique designation for a transmitter station.

New!!: Traffic analysis and Call sign · See more »

Chatter (signals intelligence)

Chatter is a signals intelligence term, referring to the volume (quantity) of intercepted communications.

New!!: Traffic analysis and Chatter (signals intelligence) · See more »

Chūichi Nagumo

was a Japanese admiral in the Imperial Japanese Navy (IJN) during World War II and onetime commander of the Kido Butai (the carrier battle group).

New!!: Traffic analysis and Chūichi Nagumo · See more »

Command hierarchy

A command hierarchy is a group of people who carry out orders based on others authority within the group.

New!!: Traffic analysis and Command hierarchy · See more »

Communication

Communication (from Latin commūnicāre, meaning "to share") is the act of conveying intended meanings from one entity or group to another through the use of mutually understood signs and semiotic rules.

New!!: Traffic analysis and Communication · See more »

Communications security

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

New!!: Traffic analysis and Communications security · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Traffic analysis and Computer security · See more »

Consul (representative)

A consul is an official representative of the government of one state in the territory of another, normally acting to assist and protect the citizens of the consul's own country, and to facilitate trade and friendship between the people of the two countries.

New!!: Traffic analysis and Consul (representative) · See more »

Counterintelligence

Counterintelligence is "an activity aimed at protecting an agency's intelligence program against an opposition's intelligence service." It likewise refers to information gathered and activities conducted to counter espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, international terrorist activities, sometimes including personnel, physical, document or communications security programs.

New!!: Traffic analysis and Counterintelligence · See more »

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.

New!!: Traffic analysis and Cryptanalysis · See more »

Data retention

Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements; although sometimes interchangeable, not to be confused with the Data Protection Act 1998.

New!!: Traffic analysis and Data retention · See more »

Data warehouse

In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence.

New!!: Traffic analysis and Data warehouse · See more »

David Beatty, 1st Earl Beatty

Admiral of the Fleet David Richard Beatty, 1st Earl Beatty (17 January 1871 – 11 March 1936) was a Royal Navy officer.

New!!: Traffic analysis and David Beatty, 1st Earl Beatty · See more »

Direction finding

Direction finding (DF), or radio direction finding (RDF), is the measurement of the direction from which a received signal was transmitted.

New!!: Traffic analysis and Direction finding · See more »

ECHELON

ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the US with the aid of four other signatory nations to the UKUSA Security Agreement Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss".

New!!: Traffic analysis and ECHELON · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Traffic analysis and Encryption · See more »

Free Haven Project

The Free Haven Project was formed in 1999 by a group of Massachusetts Institute of Technology students with the aim to develop a secure, decentralized system of data storage.

New!!: Traffic analysis and Free Haven Project · See more »

Harry Hinsley

Sir Francis Harry Hinsley OBE (26 November 1918 – 16 February 1998) was an English historian and cryptanalyst.

New!!: Traffic analysis and Harry Hinsley · See more »

Hidden Markov model

Hidden Markov Model (HMM) is a statistical Markov model in which the system being modeled is assumed to be a Markov process with unobserved (i.e. hidden) states.

New!!: Traffic analysis and Hidden Markov model · See more »

Imperial Japanese Navy

The Imperial Japanese Navy (IJN; Kyūjitai: 大日本帝國海軍 Shinjitai: 大日本帝国海軍 or 日本海軍 Nippon Kaigun, "Navy of the Greater Japanese Empire") was the navy of the Empire of Japan from 1868 until 1945, when it was dissolved following Japan's defeat and surrender in World War II.

New!!: Traffic analysis and Imperial Japanese Navy · See more »

Internet service provider

An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet.

New!!: Traffic analysis and Internet service provider · See more »

Invasion of Normandy

The Western Allies of World War II launched the largest amphibious invasion in history when they assaulted Normandy, located on the northern coast of France, on 6 June 1944.

New!!: Traffic analysis and Invasion of Normandy · See more »

Military intelligence

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions.

New!!: Traffic analysis and Military intelligence · See more »

Norway

Norway (Norwegian: (Bokmål) or (Nynorsk); Norga), officially the Kingdom of Norway, is a unitary sovereign state whose territory comprises the western portion of the Scandinavian Peninsula plus the remote island of Jan Mayen and the archipelago of Svalbard.

New!!: Traffic analysis and Norway · See more »

Onion routing

Onion routing is a technique for anonymous communication over a computer network.

New!!: Traffic analysis and Onion routing · See more »

Operation Quicksilver (deception plan)

Operation Quicksilver was a Second World War military deception.

New!!: Traffic analysis and Operation Quicksilver (deception plan) · See more »

Pas-de-Calais

Pas-de-Calais is a department in northern France named after the French designation of the Strait of Dover, which it borders ('pas' meaning passage).

New!!: Traffic analysis and Pas-de-Calais · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Traffic analysis and Password · See more »

Pattern-of-life analysis

Pattern-of-life analysis is a method of surveillance specifically used for documenting or understanding a subject's (or many subjects') habits.

New!!: Traffic analysis and Pattern-of-life analysis · See more »

Reinhard Scheer

Reinhard Scheer (30 September 1863 – 26 November 1928) was an Admiral in the Imperial German Navy (Kaiserliche Marine).

New!!: Traffic analysis and Reinhard Scheer · See more »

Room 40

In the history of cryptanalysis, Room 40, also known as 40 O.B. (Old Building) (latterly NID25) was the section in the British Admiralty most identified with the British cryptanalysis effort during the First World War, in particular the interception and decoding of the Zimmermann Telegram which played a role in bringing the United States into the War.

New!!: Traffic analysis and Room 40 · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: Traffic analysis and Secure Shell · See more »

Signaling (telecommunications)

In telecommunication, signaling has the following meanings.

New!!: Traffic analysis and Signaling (telecommunications) · See more »

Signals intelligence

Signals intelligence (SIGINT) is intelligence-gathering by interception of signals, whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT).

New!!: Traffic analysis and Signals intelligence · See more »

Social network analysis

Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory.

New!!: Traffic analysis and Social network analysis · See more »

Tor (anonymity network)

Tor is free software for enabling anonymous communication.

New!!: Traffic analysis and Tor (anonymity network) · See more »

Traffic

Traffic on roads consists of road users including pedestrians, ridden or herded animals, vehicles, streetcars, buses and other conveyances, either singly or together, while using the public way for purposes of travel.

New!!: Traffic analysis and Traffic · See more »

World War I

World War I (often abbreviated as WWI or WW1), also known as the First World War, the Great War, or the War to End All Wars, was a global war originating in Europe that lasted from 28 July 1914 to 11 November 1918.

New!!: Traffic analysis and World War I · See more »

World War II

World War II (often abbreviated to WWII or WW2), also known as the Second World War, was a global war that lasted from 1939 to 1945, although conflicts reflecting the ideological clash between what would become the Allied and Axis blocs began earlier.

New!!: Traffic analysis and World War II · See more »

Zendian problem

The Zendian problem was an exercise in communication intelligence operations (mainly traffic analysis and cryptanalysis) devised by Lambros D. Callimahos as part of an advanced course, CA-400, that Callimahos taught to National Security Agency cryptanalysts starting in the 1950s.

New!!: Traffic analysis and Zendian problem · See more »

Redirects here:

Traffic flow security, Traffic-flow security.

References

[1] https://en.wikipedia.org/wiki/Traffic_analysis

OutgoingIncoming
Hey! We are on Facebook now! »