1973
DOI: 10.1080/03155986.1973.11731552
|View full text |Cite
|
Sign up to set email alerts
|

Security Of Data Communications: A Realization Of Piggyback Infiltration*

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

1975
1975
1980
1980

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Furthermore, associated terminals , telecommunication systems, communication processors, an d computers must be protected from intruders that may seek t o alter programs or data in the system, or to disrupt the services provided . These threats are real, since it is no t difficult to intercept transmissions in telecommunicatio n networks [4,5], and it is possible to connect illicit terminals (or even computers) into the system for the purpose s of "managing" the normal terminal-computer communications , masquerading as a legitimate user, or simply making the syste m unavailable to others [5,7] .The protection of a computer communication system agains t the various threats involves :(1) identification,and authentication of the identity, (2) controlled access to computer s and their data bases, and (3) protection of the data i n transit in the telecommunication system . Associated with…”
mentioning
confidence: 99%
“…Furthermore, associated terminals , telecommunication systems, communication processors, an d computers must be protected from intruders that may seek t o alter programs or data in the system, or to disrupt the services provided . These threats are real, since it is no t difficult to intercept transmissions in telecommunicatio n networks [4,5], and it is possible to connect illicit terminals (or even computers) into the system for the purpose s of "managing" the normal terminal-computer communications , masquerading as a legitimate user, or simply making the syste m unavailable to others [5,7] .The protection of a computer communication system agains t the various threats involves :(1) identification,and authentication of the identity, (2) controlled access to computer s and their data bases, and (3) protection of the data i n transit in the telecommunication system . Associated with…”
mentioning
confidence: 99%