expand for answer

Over-the-air key distribution

Providing electronic key via overtheair rekeying, overtheair key transfer, or cooperative key generation.


Similar items:
Procedure by which a distant cryptoequipment is rekeyed electrically, with specific actions required by the receiving terminal operator. Synonymous with cooperative remote rekeying. (Also . See automatic remote keying. )
[view]
The transfer of personally identifiable information (PII) by the recipient of the original data to a second recipient. For example, the transfer of PII from an entity in Germany to an entity in the United States constitutes onward transfer of that data.
[view]
Changing traffic encryption key or transmission security key in remote cryptoequipment by sending new key directly to the remote cryptoequipment over the communications path it secures.
[view]
Short name referring to investigation, study, and control of compromising emanations from information system equipment. The study and control of electronic signals produced by various types of electronic hardware, such as computers, televisions, phones, and so on. Its primary goal is to prevent EM and RF radiation from leaving a strictly defined area so as to eliminate the possibility of external radiation monitoring, eavesdropping, and signal sniffing. The study and control of spurious electronic signals emitted from electronic equipment. TEMPEST is a classification of technology designed to minimize the electromagnetic emanations generated by computing devices. TEMPEST technology makes it difficult, if not impossible, to compromise confidentiality by capturing emanated information.
[view]
In legal proceedings, each side has a duty to preserve evidence related to the case and, through the discovery process, share information with their adversary in the proceedings. This discovery process applies to both paper records and electronic records, and the electronic discovery (or e-Discovery) process facilitates the processing of electronic information for disclosure.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in