Neil C. Rowe, U.S. Naval Postgraduate School
Electronic Emanations from Computer Technology
The Physics of Electronic Emanations
Electronic Eavesdropping Technology
Points of Weakness for Electromagnetic Emanations in Computer Systems
Reducing the Threat of Electronic Emanations
Noise Generation and Encryption
Protecting against Offensive Signals
Damage Mechanisms for Electromagnetic Signals
Countermeasures for Damaging Electromagnetic Signals
Electromagnetic Noise to Interfere with Computer Systems
The term electronic protection has been used inconsistently in the literature to mean several things related to information security. We interpret it here in the strict sense of methods of protecting information systems from attacks that do not require an electrical or software connection to the target but exploit electromagnetic effects of electronics. Unfortunately, electrical connections to a target system are not necessary to have serious security problems. We do not consider here other important aspects of this considered elsewhere in the Handbook, such as radio frequency and wireless communications security, wireless information warfare, hacking techniques in wireless networks, mobile devices and protocols, and smart card security. We also do not consider primarily nonelectronic ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.