Assessment of information losses level due to adverse electromagnetic radiation
DOI:
https://doi.org/10.18372/2410-7840.15.4781Keywords:
information losses, signal attenuation, spurious emissions, attenuation coefficient, the model HutAbstract
In the process of building complex systems of information protection of corporate networks is necessary to analyze and evaluate possible losses due to stray electromagnetic radiation from various sources. Currently, the models of threat assessment information leakage due to spurious emissions are generic in nature and there are no adequate analytical models to assess the level of spurious emissions at given points inside and outside. No analytical approximation of electro-magnetic fields. In this case, get the numerical evaluation of security is only possible by experimental studies. Based on practical experiments were conducted measuring the levels of spurious emissions at different distances from the radiation source in a wide frequency range. To study the corporate network is made of spline approximation of the experimental data on which to base the analytical expressions for estimating the field attenuation at frequencies investigated by improving the Hata model. The comparison of experimental data and analytical calculations showed the adequacy of the mathematical model. The developed models can analytically evaluate the level of spurious corporate networks and can be used in the design and construction of complex security systems.
References
Галатенко В.А. Информационная безопасность/ В.А. Галатенко // Открытые системы.-№4. – 1995. – С. 17-23.
Конахович Г.Ф. Захист інформації в телекомунікаційних системах/Г.Ф. Конахович, В.П. Климчук, С.М. Паук, В.Г. Потапов//–К.:НАУ, 2007. – 321 с.
Генне В.И. Защита информации от утечки через побочные электромагнитные излучения цифрового электронного оборудования/ В.И. Генне //Конфидент. –№2. –1988. – С. 8-12.
Бузов Г.А. Защита от утечки информации по техническим каналам: Учебное пособие/Г.А. Бузов, С.В. Калинин, А.В. Кондратьев / М.: Горячая линия-Телеком, 2005. – 416 с.
Руководящий документ. Руководство по разработке профилей защиты и заданий по безопасности. Гостехкомиссия России / Информационная безопасность. –№1. – 2006. – С.1-6.
Galatenko V.A. (1995) Information Security., Open Systems, No.4, pp. 17-23.
Konakhovich G.F., Klimchuk G.F., Pauk S.M., Potapov V.G., (2007), Data protection in telecommunication systems, Kyiv, NAU, 321 p.
Henne V.I.(1988), Data Protecting from losses via electromagnetic radiation side of digital electronic equipment, Confident, No.2, pp. 8-12.
Buzov G.A., Kalinin S.V., Kondratyev A.V., (2005), Protection against leakage of information through technical channels, Moscou, Hotline-Telecom, 416 p.
Guidance document. Guidelines for the development of protection profiles and security assignments. Russian State Technical Commission (2006), Information Security, No.1, pp.1-6.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).