欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T K 84-2011 Test methods and guide against information leaks through unintentional electromagnetic emissions (Study Group 5)《(预发布)通过无意识的电磁放射阻止信息泄露的测试方法及指导》.pdf

    • 资源ID:799329       资源大小:357.46KB        全文页数:36页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T K 84-2011 Test methods and guide against information leaks through unintentional electromagnetic emissions (Study Group 5)《(预发布)通过无意识的电磁放射阻止信息泄露的测试方法及指导》.pdf

    1、 International Telecommunication Union ITU-T K.84TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES K: PROTECTION AGAINST INTERFERENCE Test methods and guide against information leaks through unintentional electromagnetic emissions Recommendation ITU-T K.84 Rec. ITU-T K.84 (01/2011) i

    2、Recommendation ITU-T K.84 Test methods and guide against information leaks through unintentional electromagnetic emissions Summary In an information security management system (ISMS), based on Recommendation ITU-T X.1051 and ISO/IEC Standards 27001 and 27002, physical security is a key issue. When s

    3、ecurity is managed taking the above references into consideration, we should evaluate the threats and mitigate their impact against equipment or sites. Threats are related to confidentiality in the ISMS. Recommendation ITU-T K.84 describes threats from information leakage due to unintentional electr

    4、omagnetic emanations, and the two approaches of mitigation, i.e., reduction of emission from equipment and the level of site shielding are described. Information leakage test methods for conducted and radiated emission are presented. History Edition Recommendation Approval Study Group 1.0 ITU-T K.84

    5、 2011-01-13 5 Keywords Emanation, EMC, emission, ISMS, security, shield. ii Rec. ITU-T K.84 (01/2011) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telec

    6、ommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization A

    7、ssembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology

    8、which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance wit

    9、h this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory

    10、language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of t

    11、his Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the da

    12、te of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consul

    13、t the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2011 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T K.84 (01/2011) iii Table of Contents Page 1 Scope 1 2 References. 1 3 Definitions 2

    14、 3.1 Terms defined elsewhere 2 3.2 Terms defined in this Recommendation . 2 4 Abbreviations 3 5 Test method and guide for EMSEC 3 5.1 Threats against EMSEC . 3 5.2 Security management approach 4 5.3 EMSEC requirements for radiation 5 5.4 EMSEC requirements for conducted emission . 7 Annex A Methods

    15、of testing for radiation in EMSEC 9 A.1 Overview 9 A.2 General requirements for measurement 9 A.3 Method of testing for radiation leakage (Wideband method) 10 A.4 Method of testing for radiation leakage (Narrow-band method) 11 Annex B Methods of testing for conductive coupling in EMSEC 14 B.1 Overvi

    16、ew 14 B.2 General requirements for measurement 14 B.3 Method of testing for conducted leakage . 14 Appendix I Threat of EMSEC 16 I.1 Electromagnetic wave leakage . 16 I.2 Method of estimating possible distance for information leakage . 17 Appendix II Confidentiality of IT equipment . 20 Appendix III

    17、 Example of wideband measurement . 22 Appendix IV Example of narrow-band measurement 24 Bibliography. 26 iv Rec. ITU-T K.84 (01/2011) Introduction Radio waves are unintentionally emitted from information technology equipment, and there have been cases where information has been reproduced by electro

    18、magnetic waves being received. Information leakage due to unintentional electromagnetic radiation from equipment is related to physical security in adopting the information security management system (ISMS) based on ITU-T X.1051, ISO/IEC 27001, ISO/IEC 27002 and b-IEC 17799. This phenomenon is refer

    19、red to as EMSEC (emanation security or Electromagnetic emanation security) in this Recommendation. It is important to prevent a lack of confidentiality due to unintentional electromagnetic radiation, particularly in equipment that is handling important information. This Recommendation describes thre

    20、ats and confidentiality related to EMSEC, and two approaches to mitigation methods. The first approach involves emission requirements for equipment and the second involves shielding requirements for sites, when equipment that is examined with existing EMC emission standards such as ITU-T K.48 and CI

    21、SPR 22 is installed at a site. Rec. ITU-T K.84 (01/2011) 1 Recommendation ITU-T K.84 Test methods and guide against information leaks through unintentional electromagnetic emissions 1 Scope It is the purpose of this Recommendation to prevent information leakage due to unintentional electromagnetic r

    22、adiation from telecommunication equipment handling important information, when the telecommunication equipment or sites are managed by ISMS. This Recommendation gives guidance to reduce the threats from information leakage due to unintentional electromagnetic emanation from information equipment at

    23、telecommunication centres. Information is transmitted through electromagnetic waves unintentionally radiated from many kinds of equipment such as personal computers, data servers, laser printers, keyboards, and cryptographic modules. Amongst them, this Recommendation treats only information leakage

    24、from equipment including raster scan video signal. Further study is needed on issues involving other kinds of leaked signals. Two approaches to protect against threats are given in this Recommendation. The first approach is: Emission requirements and methods of examining equipment are applied when t

    25、he equipment cannot be installed in the shielding site, which should reduce the emission of the equipment. The second approach is: Shielding requirements for sites such as buildings are applied when the equipment can be installed at secure sites. 2 References The following ITU-T Recommendations and

    26、other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encoura

    27、ged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone docum

    28、ent, the status of a Recommendation. ITU-T K.42 Recommendation ITU-T K.42 (1998), Preparation of emission and immunity requirements for telecommunication equipment General principles. ITU-T K.48 Recommendation ITU-T K.48 (2006), EMC requirements for telecommunication equipment Product family Recomme

    29、ndations. ITU-T K.78 Recommendation ITU-T K.78 (2009), High altitude electromagnetic pulse immunity guide for telecommunication centres. ITU-T K.81 Recommendation ITU-T K.81 (2009), High-power electromagnetic immunity guide for telecommunication systems. ITU-T X.1051 Recommendation ITU-T X.1051 (200

    30、8) | ISO/IEC 27011:2008, Information technology Security techniques Information security management guidelines for telecommunications organizations based on ISO/IEC 27002. 2 Rec. ITU-T K.84 (01/2011) CISPR 16-1 CISPR 16-1 (All parts), Specification for radio disturbance and immunity measuring appara

    31、tus. CISPR 16-2 CISPR 16-2 (All parts), Specification for radio disturbance and immunity measuring apparatus and methods. CISPR 22 CISPR 22 ed 5.2 (2006), Information technology equipment Radio disturbance characteristics Limits and methods of measurement. ISO/IEC 27001 ISO/IEC 27001:2005, Informati

    32、on technology Security techniques Information security management systems Requirements. ISO/IEC 27002 ISO/IEC 27002:2005, Information technology Security techniques Code of practice for information security management. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the following

    33、terms defined elsewhere: 3.1.1 availability ISO/IEC 27002: Ensuring that authorized users have access to information and associated assets when required. 3.1.2 emanation b-IETF RFC 2828: A signal (electromagnetic, acoustic, or other medium) that is emitted by a system (through radiation or conductan

    34、ce) as a consequence (i.e., by-product) of its operation, and that may contain information. (See: TEMPEST.) 3.1.3 integrity ISO/IEC 27002: Safeguarding the accuracy and completeness of information and processing methods. 3.1.4 TEMPEST b-IETF RFC 2828: A nickname for specifications and standards for

    35、limiting the strength of electromagnetic emanations from electrical and electronic equipment and thus reducing vulnerability to eavesdropping. 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 confidentiality: Ensuring that information is accessible only

    36、 to those authorized to have access. EMSEC is a threat to this confidentiality. In this Recommendation, if the equipment cannot be mitigated itself, the emission values of existing electromagnetic compatibility (EMC) requirement show the level of this confidentiality. The details are described in Ap

    37、pendix II. 3.2.2 electromagnetic emanations security (EMSEC): Physical constraints to prevent information compromised through signals emanated by a system, particularly by the application of TEMPEST technology to block electromagnetic radiation. In this Recommendation, the term EMSEC is used only fo

    38、r information leakage due to unintentional electromagnetic emission. 3.2.3 threat: A potential security violation which could lead to a lack of confidentiality due to an insufficient electromagnetic emanation security (EMSEC). Examples of threats are described in clause 5. 3.2.4 time varying stripe:

    39、 A vertical stripe pattern whose vertical lines vary. The number of stripes on the VSP increases from 1 to half the number of horizontal pixels over time. 3.2.5 vertical stripe pattern: White vertical lines on a black screen on VDU of the equipment under test (EUT). The width of the white and black

    40、lines are the same. 3.2.6 vulnerability: The possibility that equipment will function falsely with EMSEC. Rec. ITU-T K.84 (01/2011) 3 4 Abbreviations This Recommendation uses the following abbreviations: AMN Artificial Mains Network BPF Band Pass Filter EMC Electromagnetic Compatibility EMSEC Emanat

    41、ion security or Electromagnetic emanation security EUT Equipment Under Test ISMS Information Security Management System LM Level Meter NEBS Network Equipment Building Systems NF Noise Figure RBW Resolution Bandwidth SN Signal to Noise ratio TVS Time Varying Stripe (pattern) VBW Video Bandwidth VDU V

    42、ideo Display Unit/Visual Display Unit VESA Video Electronics Standards Association VSP Vertical Stripe Pattern 5 Test method and guide for EMSEC 5.1 Threats against EMSEC EMSEC threats are determined according to comparisons of the confidentiality and threat levels as given in clause 5 of ITU-T K.81

    43、. The threat level is determined by intrusion range, portability and availability of the threat devices. The threat of EMSEC is described in Appendix I. The confidentiality level of the equipment, which is evaluated with existing EMC standards, is presented in Appendix II. Examples of threats agains

    44、t EMSEC are summarized in Table 5.1-1. Definitions of threat related to portability levels and threat availability levels are presented in Tables 5.1-2 and 5.1-3. The availability level shall be thought of as a measure of both the cost and the technological sophistication of the threat devices such

    45、as receivers, antennas and so on. 4 Rec. ITU-T K.84 (01/2011) Table 5.1-1 Examples of threats related to information leakage Types of threats Examples of receiver Possible distance for EMSEC Threat level Threat number Confidentiality level class A Confidentiality level class B Intrusion range on att

    46、ack side Portability Availability EMSEC Special receiver 330 ma)105 ma)Zone 0 PIII AIV K4-1 Special receiver 330 ma)105 ma)Zone 1 PIII AIV K4-2 General-purpose EMC receiver 59 ma)263 m 19 ma)83 m Zone 1 PII AIII K4-3 General-purpose EMC receiver 59 ma)263 m 19 ma)83 m Zone 2 PII AIII K4-4 Amateur re

    47、ceiver 33 ma)148 m 11 ma)47 m Zone 1 PII AII K4-5 Amateur receiver 33 ma)148 m 11 ma)47 m Zone 2 PII AII K4-6 Amateur receiver 33 ma)148 m 11 ma)47 m Zone 3 PII AII K4-7 a)Assumed to have reinforced concrete walls as 13 dB attenuation. Table 5.1-2 Definitions of threat portability levels Threat port

    48、ability level Definition PI Pocket-sized or body-worn (Note 1) PII Briefcase or backpack sized (Note 2) PIII Motor-vehicle sized (Note 3) PIV Trailer-sized (Note 4) NOTE 1 This portability level applies to threat devices that can be hidden in the human body or in clothing. NOTE 2 This portability le

    49、vel applies to threat devices that are too large to be hidden in the human body or in clothing, but is still small enough to be carried by a person (such as in a briefcase or a backpack). NOTE 3 This portability level applies to threat devices that are too large to be easily carried by a person, but large enough to be hidden in a typical consumer motor vehicle. NOTE 4 This portability level applies to threat devices that are too large to be either easily carried by a person or hidden i


    注意事项

    本文(ITU-T K 84-2011 Test methods and guide against information leaks through unintentional electromagnetic emissions (Study Group 5)《(预发布)通过无意识的电磁放射阻止信息泄露的测试方法及指导》.pdf)为本站会员(cleanass300)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开