A.2.2, Security issues in tactical software products, Appendix a: advanced settings – SENA Serial_IPTM Redirector 4.3 User Manual

Page 45

Advertising
background image

Appendix A: Advanced Settings

A.2.1

Introduction

A.2.7

Configuring the Authentication Feature

A.2.2 Security Issues in Tactical Software Products

A.2.8

Configuring the Certificate Feature

A.2.3

SSL/TLS Security Features

A.2.9

Troubleshooting

A.2.4

What You Need to Get Started

A.2.10

COM/IP AT Commands

A.2.5

Enabling SSL/TLS Security Features

A.2.11

Certificate Authorities

A.2.6

Configuring the Encryption Feature

A.2.2 Security Issues in Tactical Software Products

Background

A PC application making a modem connection relies on the telephone line for security, as depicted in the
following diagram:

The modem connection is considered secure in three respects:

1. Data security is provided by the telephone line. Unauthorized wiretapping is considered difficult or

unlikely.

2. The identity of the destination is determined by the telephone number dialed to reach it. It is assumed

that the telephone company always connects to the number dialed.

3. The server receiving the call could verify the identity of the caller by caller ID information or by a call-

back. Neither of these measures is common in real-world applications.

A.2. SSL/TLS Security

Advertising