Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title page
Table of Contents
Copyright
Dedication
Biography
Foreword
Preface
Acknowledgments
Part I: Threats, risk and risk assessments
Chapter 1: Information Security Threats and Risk
Abstract
Introduction
Information security risk
Information security risk assessments
Organizing information security risk assessments
General risk factors for the compromise of signals
Estimating the likelihood component of risk
Summary
Chapter 2: Modeling Information Security Risk
Abstract
Introduction
Basic functions and units of measurement
Linearity and nonlinearity
Linear, areal, and volumetric density
Geometry and parametric scaling
Exponential and logistic growth
Summary
Part II: Scientific fundamentals
Chapter 3: Physics and Information Security
Abstract
Introduction
Waves
Wave energy and power
Constructive and destructive interference
Resonance
Diffraction and lenses
Antennae and gain
Point sources of radiating energy
Summary
Chapter 4: Electromagnetic Waves
Abstract
Introduction
Electromagnetic fields and flux
Vectors
Maxwell’s equations
Maxwell’s equations and information security
Summary
Chapter 5: Noise, Interference, and Emanations
Abstract
Introduction
Thermal noise
Shot noise
Emanations and electromagnetic interference
Radiating circuits
Circuit element models and electric fields
Summary
Part III: The compromise of signals
Chapter 6: Signals and Information Security
Abstract
Introduction
Modulation
Signal averaging
Risk factors for signal compromise
Introduction to information theory
Information theory and information security
Summary
Chapter 7: The Compromise of Electromagnetic Signals
Abstract
Introduction
A naïve attack
Assumptions on attackers and attack parameters
Broadband signal detection
A security limit on emanations
Anatomy of a remote attack 1: the computer video display interface
Anatomy of a remote attack 2: keyboard emanations
Summary
Chapter 8: Countermeasures to Electromagnetic Signal Compromises
Abstract
Introduction
Electromagnetic shielding
Magnetic shielding
Grounding to reduce emanations
Signal attenuation
Summary
Chapter 9: Visual Information Security
Abstract
Introduction
Fundamentals of optics and optical equipment
The resolution limit
Optical attacks
Telescopes
Summary
Chapter 10: Audible Information Security
Abstract
Introduction
Audible noise and interference
The effects of noise and distance
Audible signal propagation
Audible signal detection devices
Audible signal shielding
Summary
Part IV: Information technology risk
Chapter 11: Information Technology Risk Factors
Abstract
Introduction
Business practices and organizational culture
Security governance
User behavior
The physical security of information assets
Information technology implementation
Information security policies and information technology standards
Summary
Chapter 12: Information Technology Risk Measurements and Metrics
Abstract
Introduction
Information security risk measurement and metrics criteria
Security risk dimensions
Introduction to spatiotemporal risk measurements
Spatiotemporal risk measurements and metrics
Correlation measurements and metrics
The NIST Cybersecurity Framework
Summary
Chapter 13: Special Information Technology Risk Measurements and Metrics
Abstract
Introduction
Metrics for password resilience
Metrics for network infections: a scale-free model
Metrics in frequency and time: the Fourier transform
Metrics to determine the probability of protection
Metrics for intrusion detection: the Markov process
Summary
Part V: The physical security of information assets
Chapter 14: Physical Security Controls
Abstract
Introduction
Authenticating identity
Verifying authorization
Assessing affiliation
Technical surveillance countermeasures
Summary
Chapter 15: Data Centers: A Concentration of Information Security Risk
Abstract
Introduction
A (high-level) data center physical security strategy
The security of virtualization
An electromagnetic threat to data centers
Summary
Epilogue
Appendix A: The Divergence and Curl Operators
Appendix B: Common Units of Electricity and Magnetism
Appendix C: Capacitive and Inductive Coupling in Circuits
Appendix D: Intermediate Frequency (IF) Filtering of Signals
Appendix E: An Indicative Table of Contents for an Information Security Policy
Index
← Prev
Back
Next →
← Prev
Back
Next →