Electronic Protection / Chapter 77, The Handbook of Information Security
dc.contributor.author | Rowe, Neil C. | |
dc.date.accessioned | 2013-09-18T17:26:25Z | |
dc.date.available | 2013-09-18T17:26:25Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Chapter 77 in the The Handbook of Information Security, H. Bidgoli, ed., New York: Wiley, 2006. | |
dc.identifier.uri | http://hdl.handle.net/10945/36447 | |
dc.description | This is chapter 77 in the The Handbook of Information Security, H. Bidgoli, ed., New York: Wiley, 2006. | en_US |
dc.description.abstract | Electronic protection involves methods of preventing spies from stealing secrets from the electromagnetic emanations of your information systems, as well as methods of preventing saboteurs from incapacitating or destroying your information systems using electromagnetic radiation. We discuss the kinds of threats and what can be done to reduce or prevent them. Particular weaknesses are video monitors, keyboards, and cables. Electromagnetic shielding is helpful, but requires special additions to computer hardware. Source suppression, noise generation, encryption, deliberate irregularity, and deliberate deception can also help against spies but require careful planning. Bug detectors can alert you to electronic devices that may be eavesdropping, but do not always work. As for electromagnetic sabotage, similar shielding methods can protect against it, but backup methods are important, including current limiters. | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.title | Electronic Protection / Chapter 77, The Handbook of Information Security | en_US |
dc.type | Book Chapter | en_US |
dc.subject.author | bug detectors | en_US |
dc.subject.author | camouflage | en_US |
dc.subject.author | eavesdropping | en_US |
dc.subject.author | electromagnetic pulses | en_US |
dc.subject.author | electromagnetic radiation | en_US |
dc.subject.author | electromagnetic shielding | en_US |
dc.subject.author | emanations security | en_US |
dc.subject.author | emissions security | en_US |
dc.subject.author | encryption | en_US |
dc.subject.author | high-power microwaves | en_US |
dc.subject.author | information warfare | en_US |
dc.subject.author | source suppression | en_US |
dc.subject.author | TEMPEST | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |