TEMPEST versus CEM
Electromagnetic spying – TEMPEST Risks, analysis, validation and standards
Article REF: E1345 V1
TEMPEST versus CEM
Electromagnetic spying – TEMPEST Risks, analysis, validation and standards

Authors : Alain ALCARAS, Jean-François GAENG

Publication date: February 10, 2024 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

7. TEMPEST versus CEM

The TEMPEST field is sometimes considered to be one of the fields of EMC in the broadest sense of the term, because of the points it has in common, but it is also sometimes considered to stand apart. In the following paragraphs, we propose to present the aspects that are common and those that differ.

7.1 Risk comparison

By definition, EMC deals with the risk of operating disturbances caused by the electromagnetic and electrical environments of equipment and systems, whether these environments are created by the equipment itself or by other natural or artificial phenomena. In all fields of EMC, we can thus designate both the sources of disturbance and the victims of such disturbances, whether intentional or unintentional. The TEMPEST risk can also be characterized...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details