- traffic flow security
- The protection resulting from features, inherent in some cryptoequipment, that conceal the presence of valid messages on a communications circuit, normally achieved by causing the circuit to appear busy at all times.
Military dictionary. 2000.
Look at other dictionaries:
Traffic analysis — is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages… … Wikipedia
Traffic shaping — (also known as packet shaping ) is the control of computer network traffic in order to optimize or guarantee performance, lower latency, and/or increase usable bandwidth by delaying packets that meet certain criteria. [… … Wikipedia
Communications security — Not to be confused with Commonwealth Securities. Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended… … Wikipedia
Intelligence cycle security — This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy. National intelligence programs,… … Wikipedia
Air traffic control — For the Canadian musical group, see Air Traffic Control (band). Airport Traffic Control Towers (ATCTs) at Amsterdam s Schiphol Airport, the Netherlands … Wikipedia
Air Traffic Organization — Infobox Government agency agency name = Air Traffic Organization logo width = 200px logo caption = FAA Logo formed = November 2003 preceding1 = dissolved = superseding = jurisdiction = Federal government of the United States employees = 35,000+… … Wikipedia
Right- and left-hand traffic — countries with right hand traffic … Wikipedia
Network traffic measurement — In computer networks, network traffic measurement is the process of measuring the amount and type of traffic on a particular network. This is especially important with regard to effective bandwidth management. Contents 1 Tools 1.1 Functions and… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Voip security — VoIP SecurityDefined: Voice over IP (VoIP) Security is a branch of the information security field that is specifically applied to VoIP infrastructures. The objective of VoIP security is to preserve the availability of VoIP services, protection of … Wikipedia