Briefly describe RF emanation and explain how it may be mitigated.

What will be an ideal response?


Radio waves can penetrate walls, to a certain extent, and accidental spill, called RF emanation, can lead to a security vulnerability. Avoid this by placing some form of filtering between your systems and the place where the bad guys are going to be using their super high-tech Bourne Identity spy tools to pick up on the emanations. To combat these emanations, the U.S. National Security Agency (NSA) developed a series of standards called TEMPEST. TEMPEST defines how to shield systems and manifests in a number of different products, such as coverings for individual systems, wall coverings, and special window coatings.
 

Computer Science & Information Technology

You might also like to view...

What is wrong in the following program?

``` public class Test { public static void main (String[] args) { try { System.out.println("Welcome to Java"); } } }``` a. You cannot have a try block without a catch block. b. You cannot have a try block without a catch block or a finally block. c. A method call that does not declare exceptions cannot be placed inside a try block. d. Nothing is wrong.

Computer Science & Information Technology

Off page connectors on flowcharts always contain:

a. A number b. A lower case letter. c. A special character. d. An uppercase letter e. None of the above

Computer Science & Information Technology

The least access privilege is granted by a __________ pointer to __________ data.

a) non-constant, non-constant b) non-constant, constant c) constant, non-constant d) constant, constant

Computer Science & Information Technology

Which of the following is the correct function definition header for the getAge function which is a member of the Person class?

a. int getAge(); b. int getAge() c. int Person:getAge() d. int Person::getAge()

Computer Science & Information Technology