October 12, 2009

Secure Communications


Today we use quiet a lot of two way radio communication mediums to share personal and business details. Are you sure this data or information shared is secure? Who can guarantee the security of the systems we use in our day to day lives? How can we secure our communication systems from possible hackers or virtual thieves? The answers to these questions depends upon the type of communication system we use, its purpose in our lives and the role it plays to help us do the work we intent to do using them.

Communication is imperative among humans and so it is among other living beings too. So man developed a language through which he started sharing his thoughts. Initially it was commuted through hand signals or actions. Then words, sentences and finally a proper fully fledged language were formed for communication purpose. This differed from region to region and from country to country. Still a limitation was existent as all people couldn't understand other languages and only the people nearby were able to commute. This started off the fire of communication which later evolved and is finally in a state today where even the remotest person living in Antarctica can call Japan in few seconds.

Coming back to secured two way radio communication, the more man depended on communication the need for its security also became imperative. When two people shared something important they expect their messages to be private and safe. So they started using security devices to safeguard the communication systems from being hacked by third parties. Normal everyday communication has some security and we do trust that no one is tapping our calls. When communication is done for more serious matters then special care should be taken to increase the security mode of the device that we use. Mostly commercial and military operations need secured two way radio communication systems. In recent years we hear so much about top secret messages from government or military sources being intercepted by terrorists. The same happens the other way too wherein the military or police intercept the enemy connections.

During the Second World War a highly effective secured communication was used between Winston Churchill and US President Roosevelt. This secured communication was called Green Hornet. Initially they were talking through radio phones which were easily overheard by the Nazis. It was then that the Green Hornet was introduced. Whoever tried to intercept would just hear white voices. The clear original message was heard only by the two users. Different types of security are, coded, encryption, steganography etc. other security threats include Trojan horses, spy ware and viruses. These can be easily taken care of by antivirus software, registry checkers and firewalls. These are generally termed as computer security. A well protected two way radio communication is stress free and the large institution and research centers can relax due to their safe communication network. Today virus attacks are common even in mobile phones. They are transmitted through Bluetooth file transfer facilities. Secure communication is no doubt imperative for all communication needs.

0 comments: