Page 62 - ConnectorSupplier.com 2019 Mil/Aero eBook
P. 62

Shielded, Twisted-Pair Cable Assemblies Provide Critical Support for the Secure Transmission of Classified Data
Carrie Higbie, Manager, Siemon Interconnect Solutions
Critical computer networks dedicated to the storage and transmission of sensitive government, military, and national security data have long prioritized security, safeguarding such information with an array of robust security parameters and processes including firewalls, passwords, biometrics, and access cards. The information security measures specified for a given network are dictated by the nature of the data they’re meant to protect, with classified networks requiring both digital and physical protection that extends from software to network cables.
Every component of computer networks dedicated to the secure storage and transmission of classified or otherwise sensitive data, ranging from digital components like software to physical components like cabling, must comply with an array of stringent information security and physical security measures to prevent unauthorized access and exploitation.
Information Security Measures
Information security measures can be divided into personnel, physical, operational, information, and electromagnetic categories. Personnel-level security measures are the most vulnerable to exploitation, as paying, bribing, or otherwise coercing workers for access or information is the fastest, least costly, and least risky method of exploitation. Physical protection measures aim to prevent adversaries from obtaining direct access to facilities, systems, cabling, and information, and are generally a bit more difficult to exploit. Operational security measures aim to minimize errors in the configuration and operation of systems and to limit the ways in which sensitive information can leak out, and are almost always paired with information security measures, which aim to prevent outside access to digital information through encryption, firewalls, and other bitstream protection measures. Similarly, electromagnetic security aims to prevent the reception of signal emanations from equipment and cabling that could allow an adversary some distance away to intercept and decode communications signals.
   62




























































































   60   61   62   63   64