Skip to main content

Risks of the Radio communication jamming (Diagram 2)

The radio communication is defined as a communication process between two or more destinations by using electromagnetic waves which measured by Hertz (hz).Also, Hertz are expressed in multiples unites: kilohertz(Khz), megahertz(Mhz), gigahertz(Ghz). This method can send and receive data through the atmosphere. This type of communication has been facing a variety of threats, technically and naturally. One of these threats is the radio jamming which used deliberate or Inadvertent by individuals or organizations. Furthermore, this operation is impacting on data integration. The connection interruption occurs when the jammer device sends on the same frequency with a high-frequency power, In this case, the communication between parties will be disrupted or decreased the quality of the connection with others shortly or permanently. For example, the jammer signal is sent on the same frequency for both point with a high frequency power which measured by decimal pointe(dp), then, both points will not be able to connect with each other clearly, and the quality of the signal is very weak with noisy sound. This action is happened because the signal power of both points is lower than the jammer device which make a high affect on the communication line.The diagram aims to illustrate how the jammer device effects on the connection between two destinations.
(Author's work)

Comments

  1. Very good diagram, it will be good if you can tell us what dp and mhz mean, and how they are affected as a result of the jammer device.

    ReplyDelete

Post a Comment

Popular posts from this blog

WHAT IS THE CYBER SECURITY !!!!?

    Cyber security is the mode of defending computers, servers, mobile devices, electronic systems, networks, and data from hacker attacks. (What is Cyber Security?, 2020) we can be divided the cyber security into a few common categories: 1) Network security. 2)Application security. 3)Information security. 4)Operational security. 5)Disaster recovery and business continuity. 6)End-user education. (What is Cyber Security?, 2020)   An essential job in cyber security is protecting kinds of technology devices and Sensitive data from hacker attacks. (Taylor, H. 2020) These attacks impact on a different variety of users, whether if they are governments, individuals, institutions, banks, universities, Etc The methods of hacker attacks consist of many technical tools, these technical are developing rapidly to stay invisible and penetrate through the protective technical walls to harm or steal the personal data. (Taylor, H. 2020) The following types show the popular methods using b...

Questionnaire- the impact of jamming and fraud threats on GSM system.

 In accordance with the questionnaire,  57.1% of the participants have exposed to jamming operations while they were calling with other parties by the GSM system. Also, 81.8% of them have faced fraud calls from unknown individuals. This attack is called a phishing threat which asks the victim to share his personal information such as bank details, user names, passwords or other things that related to the victim with the hacker either by text message or phone call.

My First Step in the Technological World

(Wondershare Group., 2020)   Well👀 I think you are waiting for my story with the Technology💻. I used to collect many types of computer when I was 15 years, it was one of my interests.  I have been developing my skills in Technological space which contributed to change my concept about the Technology.  In Saudi Arabia, the Saudi Federation for Cybersecurity and programming are interesting in development and encouragement the Technology Fields in many ways 📣; I was very excited to discover where I can find my self in this project?💭They have been doing many conferences about the latest science in the field of Technology📷, and made technology competitions and many courses in Cybersecurity, Programming, Encryption and many other sections participating by many computer experts.   In 2018, the biggest Hackathon in the middle east was in Saudi Arabia called HACKATHON ALHAJJ, which supported by GOOGLE.  Many programmers and designers competed to ...