The Designing of TEMPEST Security Testing Model

نویسندگان

  • Liu Jinming
  • Mao Jian
  • Zhang Jiemin
  • Li Yongmei
چکیده

Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attempts to design a mathematical model for TEMPEST testing that will facilitate the analysis of the key factors in TEMPEST testing and standard revising.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Designing and Explaining the Model of Job Enrichment with the Emphasis on Employee's Behavioral Dimension in Social Security Organization

Background: As a job design technique, job enrichment emphasizes intra-job motivation in job duties and responsibilities to achieve appropriate behavioral outcomes. The present study aims to design and explain a job enrichment model considering the behavioral dimension of employees in Social Security Organization. Methods: The research method was conducted based on qualitative content analysis...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Designing and Testing a Model of the Antecedents of Eating Disorders Symptoms in Female Students of Isfahan University in 2017: A Descriptive Study

Background and Objectives: Eating disorders include a range of illnesses associated with weight gain or weight loss. Studies show that this disorder begins in the middle to late adolescence (14-18 years old) and is also more prevalent in female sex. The purpose of this study was designing and testing a model of antecedents of eating disorders symptoms in undergraduate female students of Isfahan...

متن کامل

Testing Weak-Form Efficient Capital Market Case Study: TSE and DJUS Indices

The present study investigated weak-form market information efficiency in Tehran security exchange (TSE) as an emerging market and in Dow Jones United States security exchange (DJUS) as a developed market based on random walk model. In each market, the random walk model was examined using daily and monthly returns of a set of indices. The results of the parametric and non-parametric tests indic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013