Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security
Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of...
Main Authors: | Maxwell Martin, Funlade Sunmola, David Lauder |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-09-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/22/18/7064 |
Similar Items
-
A TEMPEST vulnerability prediction method for cyber security practitioners
by: Maxwell Martin, et al.
Published: (2023-09-01) -
Use of generator substitution to determine the real attenuation of informative signals in the compromising emanation
by: Alexander A. Golyakhov, et al.
Published: (2018-05-01) -
A Quantitative Analysis of Compromising Emanation From TMDS Interface and Possibility of Sensitive Information Leakage
by: Euibum Lee, et al.
Published: (2022-01-01) -
Experimental Estimation of a Potential Eavesdropping Distance for Electromagnetic Emanations of Video System
by: Alexander Bolshakov, et al.
Published: (2019-04-01) -
Analysis of Compromising Emanations from a Laser Printer Printing Head for the Purpose of Assess the Possibility of Information Interception
by: Aleksandr Anatolevich Golyakov, et al.
Published: (2015-10-01)