A.2.2, Security issues in tactical software products, Appendix a: advanced settings – SENA Serial_IPTM Redirector 4.3 User Manual
Page 45
Appendix A: Advanced Settings
A.2.1
Configuring the Authentication Feature
A.2.2 Security Issues in Tactical Software Products
Configuring the Certificate Feature
A.2.3
A.2.4
A.2.10
A.2.5
Enabling SSL/TLS Security Features
A.2.11
A.2.6
Configuring the Encryption Feature
A.2.2 Security Issues in Tactical Software Products
Background
A PC application making a modem connection relies on the telephone line for security, as depicted in the
following diagram:
The modem connection is considered secure in three respects:
1. Data security is provided by the telephone line. Unauthorized wiretapping is considered difficult or
unlikely.
2. The identity of the destination is determined by the telephone number dialed to reach it. It is assumed
that the telephone company always connects to the number dialed.
3. The server receiving the call could verify the identity of the caller by caller ID information or by a call-
back. Neither of these measures is common in real-world applications.
A.2. SSL/TLS Security