Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence
Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of dete...
Main Authors: | S. V. Skryl, S. S. Nikulin, A. V. Mazin, V. I. Spivak, V. O. Krylov, V. V. Nikulina |
---|---|
Format: | Article |
Language: | English |
Published: |
CRI «Electronics»
2020-12-01
|
Series: | Радиопромышленность |
Subjects: | |
Online Access: | https://www.radioprom.org/jour/article/view/748 |
Similar Items
-
Experimental Estimation of a Potential Eavesdropping Distance for Electromagnetic Emanations of Video System
by: Alexander Bolshakov, et al.
Published: (2019-04-01) -
Use of generator substitution to determine the real attenuation of informative signals in the compromising emanation
by: Alexander A. Golyakhov, et al.
Published: (2018-05-01) -
TEMPEST attacks : Using a simple radio receiver
by: Karlsson, Jonas
Published: (2003) -
The problem of special research facilities PLC-networks in the validation tests for safety information is considered
by: A. A. Balaev, et al.
Published: (2012-03-01) -
Becoming-Ariel: Viewing Julie Taymor’s The Tempest through an Ecocritical Lens
by: Clare Sibley-Esposito
Published: (2012-02-01)