ASSESMENT OF INFORMARTION SECURITY METHOD FROM OUTFLOW THROUGH TRANSIENT ELECTROMAGNETIC PULSE EMANATION

Authors

  • Ю. І. Хлапонін

DOI:

https://doi.org/10.18372/2310-5461.28.9677

Keywords:

transient electromagnetic pulse emanation, local network, data protection, protection rating, signal energy, signal spectrum, Fourier transformation

Abstract

Recently, methods of information interception with transient electromagnetic pulse emanation of local network elements are getting developed. Separate computers security methods are worked out well and backed up with necessary regulatory documents. However, information security through TEMPEST is far more hard to do in local network then in separate devices. That’s why special institutional, algorithmic and methodological approaches should be used to detect electromagnetic pulse emanations. Methods of spotting TEMPEST were analyzed. There are panoramas difference method, audiovisual method, expert method and parametric correlation method.

Development of methodology for assessing information security from the information outflow by the transient electromagnetic pulse emanation of computer technology by using the text signal as a continuous sequence of pulses     was the main goal of this project The mathematical apparatus allows calculating the energy of a single signal by transfer logic "1" or a logical "0".These approaches can be considered into accounting by improving special researches  of transient electromagnetic pulse emanation   methods on  EVT.

References

Ленков С. В. Методы и средства защиты ин-формации / С. В. Ленков, Д. А. Перегудов, В. А. Хорошко; под ред. В. А. Хорошко. — К. : Арий, 2010. — Т. I. Несанкционированное получение информации. — 464 с.

Пятачков А. Г. Защита информации, обраба-тываемой вычислительной техникой, от утечки по техническим каналам / А. Г. Пятачков. — М. : НП РЦИБ «Факел», 2007.

Електронний ресурс. — Режим доступу: http://www.epos.ua/view.php/about_pubs_arc hive?subaction=showfull&id=1037743200&archive=%20&start_from=%20&ucat=2&

Published

2015-11-24

Issue

Section

Information Security