Protection of information leakage by channels telephone
DOI:
https://doi.org/10.20535/RADAP.2013.55.143-148Keywords:
technical defence of information, information security, language information, switched telephone networks, communication channelsAbstract
Introduction. The design rule requirements for abstracts and reports for participate in the International Scientific Technical Conference «Radio Engineering Field, Signals, Devices and Systems» or abbreviated REFSDS are presented at this paper.
Requirements for document. The requirements for execution of text, formulas, tables and figures with examples of implementation are expounded. The examples of bibliographic records execution and abstracts are presented.
Methods of counteraction to the unauthorized access. The characteristics of the known methods of detecting unauthorized connections to the subscriber telephone line, providing the confidentiality of telephone conversations, protecting from listening of apartments and prevention of the unauthorized use of telephone connection are given.
Conclusions. The classification of threats of confidentiality violation in telephone communication channels is conducted and methodology for eliminating of unauthorized interception of information is proposed. The complex use of a number of the listed technical equipments allows to prevent the use of communication channels for the wire tapping and listening of apartments, through which they pass.
References
Література
Про затверження концепціъ технічного захисту інформації в Україні : постанова Кабінету Міністрів України від 8 жовтня 1997 року № 1126 // Урядовий кур’єр. – 1997. – c. 3. – Режим доступу: http://zakon0.rada.gov.ua/laws/show/1126-97-%D0%BF
Хома В. В. Методи і засоби технічного захисту інформації на абонентських те-лефонних лініях / В.В. Хома // Автоматика, вимірювання та керування. – 2009. – № 639. – С. 87-93. [Publ.]
Мелешко О.О. Проблеми, які виникають при захисті телефонних ліній / О.О. Мелешко, І.О. Лебединська, А.В. Палазюк, А.І. Ткачук [Електронний ресурс]. — Режим доступу: http://www.rusnauka.com/35_OINBG_2010/Informatica/76208.doc.htm
Хорев А.А. Защита информации от утечки по техническим каналам. Часть 1. Те-хнические каналы утечки информации / А.А. Хорев. – М. : Гостехкомиссия РФ. – 1998. – 320 с.
Универсальный анализатор проводных коммуникаций ULAN-2 : техническое описание и инструкция по эксплуатации. – М. – 2004. – 88 с.
Лагутин В.С. Утечка и защита информации в телефонных каналах / В.С. Лагутин, А.В. Петраков. – М. : Энергоатомиздат. – 1996. – 304 с.
References
Kontseptsiia tekhnichnoho zakhystu informatsii v Ukraini : postanova Kabinetu Ministriv Ukrainy № 1126 [Technical Information Protection in Ukraine: Resolution of the Cabinet of Ministers of Ukraine #1126] // Uriadovyi kurier, 1997, 12 Nov., p. 3. Available at: http://zakon0.rada.gov.ua/laws/show/1126-97-%D0%BF
Khoma V.V. (2009) Metody I zasoby tekhnichnoho zakhystu informatsii na abonentskykh telefonnykh liniiakh [Methods and means of technical protection of information on the user's telephone lines]. Avtomatyka, vymiriuvannia ta keruvannia, No 639, pp. 87–93. Available at: http://ena.lp.edu.ua:8080/handle/ntb/2342.
Meleshko О.О., Lebedynska І.О., Palaziyk А.V., Tkachuk А.І. Problemy, yaki vynykaiyt pry zakhysti telefonnykh linii [The problems that arise in the defense of telephone lines]. Available at: http://www.rusnauka.com/35_OINBG_2010/Informatica/76208.doc.htm
Khoriev А.А. (1998) Zashchita informatsii ot utiechki po tekhnicheskim kanalam. Chast 1. Tekhnicheskie kanaly utiechki informatsii [Protecting information from leaking via technical channels. Part 1. Technical channels of information leakage]. Мoskow, Gostekhkomissiia RF Publ., 320 p.
Universalnyi analizator provodnykh kommunikatsii ULAN-2. Tekhnicheskoie opisaniie i instruktsiia po ekspluatatsii [Universal analyzer of wired communications ULAN-2: technical description and user manual]. Мoskow, 2004, 88 p.
Lagutin V.S., Petrakov A.V. (1996) Utiechka i zashchita informatsii v telefonnykh kanalakh [Leakage protection and information in telephone channels]. Мoskow, Energoatomizdat Publ., 304 p.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).