A TEMPEST vulnerability prediction method for cyber security practitioners
Sensitive information can have its security compromised by unintentional electromagnetic emissions from the information technology equipment (ITE) being used to process it. It is important to assess the likelihood of a potential compromise, and this requires radio frequency (RF) engineering expertis...
Main Authors: | Maxwell Martin, Funlade Sunmola, David Lauder |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-09-01
|
Series: | Alexandria Engineering Journal |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S111001682300652X |
Similar Items
-
Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security
by: Maxwell Martin, et al.
Published: (2022-09-01) -
Becoming-Ariel: Viewing Julie Taymor’s The Tempest through an Ecocritical Lens
by: Clare Sibley-Esposito
Published: (2012-02-01) -
Soft tempest technology as an object of functional modeling
by: Sergey V. Skryl, et al.
Published: (2022-03-01) -
Threat and its countermeasures of TEMPEST ATTACK on computer information security(TEMPEST ATTACK对信息安全的威胁与对策)
by: LIUJie(刘杰), et al.
Published: (2004-09-01) -
TO PEOPLE AN ISLE: "THE TEMPEST" AND COLONIALISM
by: Vlad RĂZNICEANU
Published: (2020-03-01)