{"title":"Information security and emissions control","authors":"S. Pennesi, S. Sebastiani","doi":"10.1109/ISEMC.2005.1513629","DOIUrl":null,"url":null,"abstract":"Electronic equipments produce conducted and radiated emissions that are related to the data processed by the system. When the content is classified or confidential, as in military applications, the emanations must be severely controlled and restricted so that it is not possible for third parties to recover information intercepting and analyzing the emitted \"noise\". Although the problem has first arisen in the military sector, as banks and companies rely completely on electronic equipment to handle and transmit secure data, the TEMPEST aspect becomes a vital part of communications security scenario.","PeriodicalId":6459,"journal":{"name":"2005 International Symposium on Electromagnetic Compatibility, 2005. EMC 2005.","volume":"26 1","pages":"777-781 Vol. 3"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 International Symposium on Electromagnetic Compatibility, 2005. EMC 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEMC.2005.1513629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Electronic equipments produce conducted and radiated emissions that are related to the data processed by the system. When the content is classified or confidential, as in military applications, the emanations must be severely controlled and restricted so that it is not possible for third parties to recover information intercepting and analyzing the emitted "noise". Although the problem has first arisen in the military sector, as banks and companies rely completely on electronic equipment to handle and transmit secure data, the TEMPEST aspect becomes a vital part of communications security scenario.