Part 11 – Emanations

This section is brief, but covers the important issue of data compromise via electromagnetic radiation from computing and networking systems. The issue of countermeasures to thwart electronic eavesdropping on electromagnetic signals came from the Tempest study many years ago. This has since evolved into a security standard in its own right. The field concerned with this issue is referred to as EMSec for electromagnetic security. We go on to discuss several countermeasures used for EMSec. The first is surrounding equipment such as computers with a metal mesh. This is referred to as a Faraday cage and is part of the Tempest standard. The two other countermeasures discussed are the use of white noise to disguise radiated RF signals and the use of control zones. These zones are set aside for data centers and are typically located in the central portion of a building away from windows.
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?