Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security
Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-09-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/22/18/7064 |
_version_ | 1797482495357222912 |
---|---|
author | Maxwell Martin Funlade Sunmola David Lauder |
author_facet | Maxwell Martin Funlade Sunmola David Lauder |
author_sort | Maxwell Martin |
collection | DOAJ |
description | Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of the associated causal factors and their interrelationships. Several factors that can cause unintentional electromagnetic emanations that can lead to the compromise of ITE have been found in the literature. This paper confirms the list of causal factors reported in previous work, categorizes the factors as belonging to threat, vulnerability, or impact, and develops an interpretive structural model of the vulnerability factors. A participatory modelling approach was used consisting of focus groups of RF engineers. The resulting hierarchical structural model shows the relationships between factors and illustrates their relative significance. The paper concludes that the resulting model can motivate a deeper understanding of the structural relationship of the factors that can be incorporated in the RF engineers’ assessment process. Areas of future work are suggested. |
first_indexed | 2024-03-09T22:33:11Z |
format | Article |
id | doaj.art-c03d2868e85945e39d5e36b52131aa73 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-09T22:33:11Z |
publishDate | 2022-09-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-c03d2868e85945e39d5e36b52131aa732023-11-23T18:53:52ZengMDPI AGSensors1424-82202022-09-012218706410.3390/s22187064Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment SecurityMaxwell Martin0Funlade Sunmola1David Lauder2School of Physics, Engineering and Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UKSchool of Physics, Engineering and Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UKSchool of Physics, Engineering and Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UKInformation technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of the associated causal factors and their interrelationships. Several factors that can cause unintentional electromagnetic emanations that can lead to the compromise of ITE have been found in the literature. This paper confirms the list of causal factors reported in previous work, categorizes the factors as belonging to threat, vulnerability, or impact, and develops an interpretive structural model of the vulnerability factors. A participatory modelling approach was used consisting of focus groups of RF engineers. The resulting hierarchical structural model shows the relationships between factors and illustrates their relative significance. The paper concludes that the resulting model can motivate a deeper understanding of the structural relationship of the factors that can be incorporated in the RF engineers’ assessment process. Areas of future work are suggested.https://www.mdpi.com/1424-8220/22/18/7064compromising emanationsTEMPESTvulnerability likelihoodcausal factorsinterpretive structural modellingfishbone diagram |
spellingShingle | Maxwell Martin Funlade Sunmola David Lauder Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security Sensors compromising emanations TEMPEST vulnerability likelihood causal factors interpretive structural modelling fishbone diagram |
title | Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security |
title_full | Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security |
title_fullStr | Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security |
title_full_unstemmed | Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security |
title_short | Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security |
title_sort | modelling causal factors of unintentional electromagnetic emanations compromising information technology equipment security |
topic | compromising emanations TEMPEST vulnerability likelihood causal factors interpretive structural modelling fishbone diagram |
url | https://www.mdpi.com/1424-8220/22/18/7064 |
work_keys_str_mv | AT maxwellmartin modellingcausalfactorsofunintentionalelectromagneticemanationscompromisinginformationtechnologyequipmentsecurity AT funladesunmola modellingcausalfactorsofunintentionalelectromagneticemanationscompromisinginformationtechnologyequipmentsecurity AT davidlauder modellingcausalfactorsofunintentionalelectromagneticemanationscompromisinginformationtechnologyequipmentsecurity |