Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Secure communication : applications and management
Sutton R., John Wiley & Sons, Inc., New York, NY, 2002. 322 pp. Type: Book (9780471499046)
Date Reviewed: Aug 13 2002

As the author states, this book is a study of how to apply cryptography to secure telecommunications. It is aimed primarily at readers with some cryptographic and electronics knowledge, and provides a variety of measures and techniques for applying various cryptographic security measures to telecommunications technologies.

The book is divided into two sections. Chapters 1, 2, and 14 are introductory and look at various technical, operational, and managerial aspects of security. The remaining chapters are application-specific, and discuss various technologies and the application of cryptology towards them. These chapters provide unique methods for applying cryptographic techniques, many of which could be applied to alternate chapters. Each chapter is broken into various sections, along with supporting diagrams and tables. The style of writing is straightforward and although technical in nature, readily understandable even by the novice. The only area in which it is lacking is supporting references and a detailed bibliography.

Chapter 1 introduces the reader to cryptology and communications security, including an in-depth section devoted to transient electromagnetic pulse surveillance technology (TEMPEST) issues. Chapter 2 continues the introduction with a look at analog and digital cipher techniques, followed by a discussion on symmetrical and asymmetrical algorithms, and finishing with a detailed section on cryptographic key management issues. Chapter 14 concludes the introductory material and the book with a look at management, support, and training issues, examining the importance of effective techniques for security implementation.

Chapter 3 is the first of the application chapters. It examines voice security in military applications. Three strategies are considered: naval communications and the use of analog HF radio; land-based military operations using standalone digital cipher units; and the application of high-class cipher modules into existing radio transceivers.

Chapter 4 covers telephone security, looking at the various network technologies involved; hardware components; types of threats; how cryptology can be applied; and relevant key management issues. The remaining application chapters all follow a similar format, and cover the following technologies: GSM systems; private UHF/VHF radio networks; frequency hopping (electronic warfare); bulk/link communications (high data rate transmission) in military and public networks; secure fax; PC security; secure email; secure VPN; and military data communications.

This book is suitable as a reference tool and guidebook for telecommunications security professionals or management involved in securing IT communications resources. It is not an introductory text, and some background or familiarity in cryptology and electronics/communications technologies is recommended. Overall, the book provides an interesting and detailed look at the application and implementation of current cryptographic techniques to secure telecommunications in both the military and pub lic sectors.

Reviewer:  V. Stagg Review #: CR126383 (0211-0606)
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Security and Protection (K.6.5 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy