Theoretical analysis and TEMPEST study – System and equipment
Electromagnetic spying – TEMPEST Risks, analysis, validation and standards
Article REF: E1345 V1
Theoretical analysis and TEMPEST study – System and equipment
Electromagnetic spying – TEMPEST Risks, analysis, validation and standards

Authors : Alain ALCARAS, Jean-François GAENG

Publication date: February 10, 2024 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

4. Theoretical analysis and TEMPEST study – System and equipment

In this paragraph, the term "product" may apply to an item of equipment, a subsystem or a system.

4.1 Study data – Product characterization

In terms of risk analysis, product input data for TEMPEST risk analysis can be identified and characterized according to 3 families of risk data:

  • the "victims" of the risk: compromising information to be protected and processed or crossed by the product in the form of red signals (SR);

  • the "sources" of the risk: these are the leaks of compromising interference signals (CPS) at the leak accesses where these CPS can be captured or qualified;

  • the "leakage paths" between victims and sources of risk; this covers...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
Theoretical analysis and TEMPEST study – System and equipment

Article included in this offer

"Electronics"

( 262 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details