In the article the considered ways and reasons of credible loss of confidential information at the use of environment for communication of data. A list over of credible threats that arose up as a result of intercept of information is brought. Charts over of communication of data are brought with the use of the external leased circuits, the ways of counteraction to listening of network traffic are considered.
informative safety, passive threat of information, way of loss of information, counteraction to the passive listening
"Analiz imovirnykh shliakhiv vytoku informatsii pry vykorystanni zovnishnoho nezakhyshchenoho seredovyshcha peredachi danykh" ,
Systems of Arms and Military Equipment,