Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence

Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of dete...

Full description

Bibliographic Details
Main Authors: S. V. Skryl, S. S. Nikulin, A. V. Mazin, V. I. Spivak, V. O. Krylov, V. V. Nikulina
Format: Article
Language:English
Published: CRI «Electronics» 2020-12-01
Series:Радиопромышленность
Subjects:
Online Access:https://www.radioprom.org/jour/article/view/748
id doaj-18311835293d4d26aeeb4e4ea92328eb
record_format Article
spelling doaj-18311835293d4d26aeeb4e4ea92328eb2021-07-28T13:52:37ZengCRI «Electronics»Радиопромышленность2413-95992541-870X2020-12-01304354610.21778/2413-9599-2020-30-4-35-46410Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligenceS. V. Skryl0S. S. Nikulin1A. V. Mazin2V. I. Spivak3V. O. Krylov4V. V. Nikulina5Bauman Moscow State Technical UniversityVoronezh Institute of the Ministry of Internal Affairs of RussiaBauman Moscow State Technical UniversityBauman Moscow State Technical UniversityBauman Moscow State Technical UniversityBauman Moscow State Technical UniversityFormulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of detectable signs of leakage but also by several other parameters characterizing the dynamics of the implementation of such a threat. The established patterns in the scenarios of violators’ actions associated with the use of technical reconnaissance equipment (TRQ) to intercept informative TEMPEST signals from computer equipment made it possible to form a model of all possible options for using TRQ to obtain confidential information processed by computer equipment. The proposed model provides the implementation of the methodological principles of the recognition theory for a more complete characterization of threats of information leakage through the channels of spurious electromagnetic radiation and interference from CE in the process of their detection.Objective. Development of methodological grounds for presenting signs of the violator’s implementation of certain functions associated with the use of technical reconnaissance equipment to intercept informative signals of spurious electromagnetic radiation and interference from computer equipment as signs that identify the most significant conditions for the recognition and prevention of such threats.Results. Methodological solutions for the identification of three states significant for the prevention of threats are given based on the structuring of the functional representation of the intruder’s actions to implement such threats. Mathematical models for assessing the predicted amount of information disclosed in the process of intercepting TEMPEST informative signals from computer equipment, and assessing the level of security threats in case of interception of information are also presented.Practical significance. The paper presents the main options for the operation of a complex of programs for recognizing threats of information leakage through TEMPEST channels from computer equipment developed within the framework of the presented methodology.https://www.radioprom.org/jour/article/view/748transient electromagnetic pulse emanation standard (tempest)computer equipment (ce)recognition of threats of information leakage through tempest channels from ce
collection DOAJ
language English
format Article
sources DOAJ
author S. V. Skryl
S. S. Nikulin
A. V. Mazin
V. I. Spivak
V. O. Krylov
V. V. Nikulina
spellingShingle S. V. Skryl
S. S. Nikulin
A. V. Mazin
V. I. Spivak
V. O. Krylov
V. V. Nikulina
Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
Радиопромышленность
transient electromagnetic pulse emanation standard (tempest)
computer equipment (ce)
recognition of threats of information leakage through tempest channels from ce
author_facet S. V. Skryl
S. S. Nikulin
A. V. Mazin
V. I. Spivak
V. O. Krylov
V. V. Nikulina
author_sort S. V. Skryl
title Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
title_short Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
title_full Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
title_fullStr Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
title_full_unstemmed Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
title_sort methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
publisher CRI «Electronics»
series Радиопромышленность
issn 2413-9599
2541-870X
publishDate 2020-12-01
description Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of detectable signs of leakage but also by several other parameters characterizing the dynamics of the implementation of such a threat. The established patterns in the scenarios of violators’ actions associated with the use of technical reconnaissance equipment (TRQ) to intercept informative TEMPEST signals from computer equipment made it possible to form a model of all possible options for using TRQ to obtain confidential information processed by computer equipment. The proposed model provides the implementation of the methodological principles of the recognition theory for a more complete characterization of threats of information leakage through the channels of spurious electromagnetic radiation and interference from CE in the process of their detection.Objective. Development of methodological grounds for presenting signs of the violator’s implementation of certain functions associated with the use of technical reconnaissance equipment to intercept informative signals of spurious electromagnetic radiation and interference from computer equipment as signs that identify the most significant conditions for the recognition and prevention of such threats.Results. Methodological solutions for the identification of three states significant for the prevention of threats are given based on the structuring of the functional representation of the intruder’s actions to implement such threats. Mathematical models for assessing the predicted amount of information disclosed in the process of intercepting TEMPEST informative signals from computer equipment, and assessing the level of security threats in case of interception of information are also presented.Practical significance. The paper presents the main options for the operation of a complex of programs for recognizing threats of information leakage through TEMPEST channels from computer equipment developed within the framework of the presented methodology.
topic transient electromagnetic pulse emanation standard (tempest)
computer equipment (ce)
recognition of threats of information leakage through tempest channels from ce
url https://www.radioprom.org/jour/article/view/748
work_keys_str_mv AT svskryl methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence
AT ssnikulin methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence
AT avmazin methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence
AT vispivak methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence
AT vokrylov methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence
AT vvnikulina methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence
_version_ 1721270350950432768