Electronic Protection

Neil C. Rowe, U.S. Naval Postgraduate School

Introduction

Electronic Emanations from Computer Technology

The Physics of Electronic Emanations

Electronic Eavesdropping Technology

Points of Weakness for Electromagnetic Emanations in Computer Systems

Error Correction

Reducing the Threat of Electronic Emanations

Electromagnetic Shielding

Source Suppression

Noise Generation and Encryption

Signal Irregularity

Deliberate Deception

Bug Detectors

Protecting against Offensive Signals

Damage Mechanisms for Electromagnetic Signals

Countermeasures for Damaging Electromagnetic Signals

Electromagnetic Noise to Interfere with Computer Systems

Conclusion

Glossary

Cross References

References

INTRODUCTION

The term electronic protection has been used inconsistently in the literature to mean several things related to information security. We interpret it here in the strict sense of methods of protecting information systems from attacks that do not require an electrical or software connection to the target but exploit electromagnetic effects of electronics. Unfortunately, electrical connections to a target system are not necessary to have serious security problems. We do not consider here other important aspects of this considered elsewhere in the Handbook, such as radio frequency and wireless communications security, wireless information warfare, hacking techniques in wireless networks, mobile devices and protocols, and smart card security. We also do not consider primarily nonelectronic ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.