The existing methods of information protection from leakage by high-frequency imposition channels are considered. The main differences between them, their general advantages and disadvantages, as well as the main methods of high-frequency imposition are described. The ways of using methods, their complex combination to ensure full protection of information are analyzed. The types of signals that may be present at the facility where critical information is processed are described. The channels of information leakage are described both in the power supply and grounding channels and through the dielectric (air). The main components of the signal that need to be considered when assessing the electromagnetic environment at the facility are also ...
International audienceAny information system must ensure the confidentiality of its sensitive data d...
Methods for protecting speech information from leaking via acoustic channels are analyzed...
Objectives. In order to determine the security of a special-purpose informatisation object, it is ne...
The rapid development and constant growth of the use of computer equipment, wireless radio access sy...
This paper discusses active methods and means of protecting information from leaks through the chann...
Problem statement. The investigation the currently used methods for determining the sources of infor...
We address the problem of assessing the protection level of the acoustoelectric channel of speech in...
Protection of speech information in a dedicated room begins with the assessment of acous...
The use of noise generators for the protection and information leakage channels stray electromagneti...
The protection of speech information is one of the main tasks of information protection and is a sig...
Electromagnetic information leak as a potential data security risk is more and more serious. Discuss...
This article describes a solution for the protection of the temporary lifting of control over the ta...
Methods for protecting speech information from leaking via acoustic channels are analyzed. A method ...
The article considers the physical basis for the formation of a technical channel of information lea...
The transmission of information over the lines inevitably comes up with its protection against eaves...
International audienceAny information system must ensure the confidentiality of its sensitive data d...
Methods for protecting speech information from leaking via acoustic channels are analyzed...
Objectives. In order to determine the security of a special-purpose informatisation object, it is ne...
The rapid development and constant growth of the use of computer equipment, wireless radio access sy...
This paper discusses active methods and means of protecting information from leaks through the chann...
Problem statement. The investigation the currently used methods for determining the sources of infor...
We address the problem of assessing the protection level of the acoustoelectric channel of speech in...
Protection of speech information in a dedicated room begins with the assessment of acous...
The use of noise generators for the protection and information leakage channels stray electromagneti...
The protection of speech information is one of the main tasks of information protection and is a sig...
Electromagnetic information leak as a potential data security risk is more and more serious. Discuss...
This article describes a solution for the protection of the temporary lifting of control over the ta...
Methods for protecting speech information from leaking via acoustic channels are analyzed. A method ...
The article considers the physical basis for the formation of a technical channel of information lea...
The transmission of information over the lines inevitably comes up with its protection against eaves...
International audienceAny information system must ensure the confidentiality of its sensitive data d...
Methods for protecting speech information from leaking via acoustic channels are analyzed...
Objectives. In order to determine the security of a special-purpose informatisation object, it is ne...