The Designing of TEMPEST Security Testing Model
نویسندگان
چکیده
Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attempts to design a mathematical model for TEMPEST testing that will facilitate the analysis of the key factors in TEMPEST testing and standard revising.
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملDesigning and Explaining the Model of Job Enrichment with the Emphasis on Employee's Behavioral Dimension in Social Security Organization
Background: As a job design technique, job enrichment emphasizes intra-job motivation in job duties and responsibilities to achieve appropriate behavioral outcomes. The present study aims to design and explain a job enrichment model considering the behavioral dimension of employees in Social Security Organization. Methods: The research method was conducted based on qualitative content analysis...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملDesigning and Testing a Model of the Antecedents of Eating Disorders Symptoms in Female Students of Isfahan University in 2017: A Descriptive Study
Background and Objectives: Eating disorders include a range of illnesses associated with weight gain or weight loss. Studies show that this disorder begins in the middle to late adolescence (14-18 years old) and is also more prevalent in female sex. The purpose of this study was designing and testing a model of antecedents of eating disorders symptoms in undergraduate female students of Isfahan...
متن کاملTesting Weak-Form Efficient Capital Market Case Study: TSE and DJUS Indices
The present study investigated weak-form market information efficiency in Tehran security exchange (TSE) as an emerging market and in Dow Jones United States security exchange (DJUS) as a developed market based on random walk model. In each market, the random walk model was examined using daily and monthly returns of a set of indices. The results of the parametric and non-parametric tests indic...
متن کامل