Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of dete...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
CRI «Electronics»
2020-12-01
|
Series: | Радиопромышленность |
Subjects: | |
Online Access: | https://www.radioprom.org/jour/article/view/748 |
id |
doaj-18311835293d4d26aeeb4e4ea92328eb |
---|---|
record_format |
Article |
spelling |
doaj-18311835293d4d26aeeb4e4ea92328eb2021-07-28T13:52:37ZengCRI «Electronics»Радиопромышленность2413-95992541-870X2020-12-01304354610.21778/2413-9599-2020-30-4-35-46410Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligenceS. V. Skryl0S. S. Nikulin1A. V. Mazin2V. I. Spivak3V. O. Krylov4V. V. Nikulina5Bauman Moscow State Technical UniversityVoronezh Institute of the Ministry of Internal Affairs of RussiaBauman Moscow State Technical UniversityBauman Moscow State Technical UniversityBauman Moscow State Technical UniversityBauman Moscow State Technical UniversityFormulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of detectable signs of leakage but also by several other parameters characterizing the dynamics of the implementation of such a threat. The established patterns in the scenarios of violators’ actions associated with the use of technical reconnaissance equipment (TRQ) to intercept informative TEMPEST signals from computer equipment made it possible to form a model of all possible options for using TRQ to obtain confidential information processed by computer equipment. The proposed model provides the implementation of the methodological principles of the recognition theory for a more complete characterization of threats of information leakage through the channels of spurious electromagnetic radiation and interference from CE in the process of their detection.Objective. Development of methodological grounds for presenting signs of the violator’s implementation of certain functions associated with the use of technical reconnaissance equipment to intercept informative signals of spurious electromagnetic radiation and interference from computer equipment as signs that identify the most significant conditions for the recognition and prevention of such threats.Results. Methodological solutions for the identification of three states significant for the prevention of threats are given based on the structuring of the functional representation of the intruder’s actions to implement such threats. Mathematical models for assessing the predicted amount of information disclosed in the process of intercepting TEMPEST informative signals from computer equipment, and assessing the level of security threats in case of interception of information are also presented.Practical significance. The paper presents the main options for the operation of a complex of programs for recognizing threats of information leakage through TEMPEST channels from computer equipment developed within the framework of the presented methodology.https://www.radioprom.org/jour/article/view/748transient electromagnetic pulse emanation standard (tempest)computer equipment (ce)recognition of threats of information leakage through tempest channels from ce |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
S. V. Skryl S. S. Nikulin A. V. Mazin V. I. Spivak V. O. Krylov V. V. Nikulina |
spellingShingle |
S. V. Skryl S. S. Nikulin A. V. Mazin V. I. Spivak V. O. Krylov V. V. Nikulina Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence Радиопромышленность transient electromagnetic pulse emanation standard (tempest) computer equipment (ce) recognition of threats of information leakage through tempest channels from ce |
author_facet |
S. V. Skryl S. S. Nikulin A. V. Mazin V. I. Spivak V. O. Krylov V. V. Nikulina |
author_sort |
S. V. Skryl |
title |
Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence |
title_short |
Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence |
title_full |
Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence |
title_fullStr |
Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence |
title_full_unstemmed |
Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence |
title_sort |
methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence |
publisher |
CRI «Electronics» |
series |
Радиопромышленность |
issn |
2413-9599 2541-870X |
publishDate |
2020-12-01 |
description |
Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of detectable signs of leakage but also by several other parameters characterizing the dynamics of the implementation of such a threat. The established patterns in the scenarios of violators’ actions associated with the use of technical reconnaissance equipment (TRQ) to intercept informative TEMPEST signals from computer equipment made it possible to form a model of all possible options for using TRQ to obtain confidential information processed by computer equipment. The proposed model provides the implementation of the methodological principles of the recognition theory for a more complete characterization of threats of information leakage through the channels of spurious electromagnetic radiation and interference from CE in the process of their detection.Objective. Development of methodological grounds for presenting signs of the violator’s implementation of certain functions associated with the use of technical reconnaissance equipment to intercept informative signals of spurious electromagnetic radiation and interference from computer equipment as signs that identify the most significant conditions for the recognition and prevention of such threats.Results. Methodological solutions for the identification of three states significant for the prevention of threats are given based on the structuring of the functional representation of the intruder’s actions to implement such threats. Mathematical models for assessing the predicted amount of information disclosed in the process of intercepting TEMPEST informative signals from computer equipment, and assessing the level of security threats in case of interception of information are also presented.Practical significance. The paper presents the main options for the operation of a complex of programs for recognizing threats of information leakage through TEMPEST channels from computer equipment developed within the framework of the presented methodology. |
topic |
transient electromagnetic pulse emanation standard (tempest) computer equipment (ce) recognition of threats of information leakage through tempest channels from ce |
url |
https://www.radioprom.org/jour/article/view/748 |
work_keys_str_mv |
AT svskryl methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence AT ssnikulin methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence AT avmazin methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence AT vispivak methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence AT vokrylov methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence AT vvnikulina methodologicalaspectsofthepresentationofinformationsecuritythreatsrecognitionsignsinthecontextofimprovingtechnicalintelligence |
_version_ |
1721270350950432768 |