Methods and techniques of protecting information from leakage by technical channels via side electromagnetic radiation
DOI:
https://doi.org/10.5281/zenodo.5534847Keywords:
technical channels of information leakage, information protection systems, indirect electromagnetic radiation and guidance, bugging devices, shieldingAbstract
The rapid development and constant growth of the use of computer equipment, wireless radio access systems, increasing the functionality of electronic means of personal use require a timely response to threats of information leakage through technical channels.
This state of affairs has exacerbated the problem of identifying technical channels of information leakage arising from technical progress, and with it the need to ensure the required level of efficiency and cost of the process of searching and identifying technical channels of information leakage.
The next important issue is the adequacy of measures to protect information from leakage through technical channels, verification and control of their effectiveness, determining the economic feasibility of the proposed set of measures.
The use of existing means of search and detection of technical channels of information leakage, its further protection are based on the use of both active and passive methods.
The article highlights methods and tools of protecting information from leakage by technical channels via side electromagnetic radiation and guidance during their processing using technical means, when transmitting via radio and optical communication channels, channels of leakage of acoustic (speech) and visual information. Basic steps to protect information from leakage by acoustic, vibroacoustic and optoelectronic channels are defined, which centre around reducing the level of acoustic and vibroacoustic signals, voicing information, to a certain signal-to-interference ratio.
The passive and active measures analysed in the article are aimed at achieving the required signal-to-interference ratio. Passive information protection measures and their focus on improving the sound insulation of enclosing structures of information activity objects are highlighted. Active information protection measures and their impact on reducing the signal-to-interference ratio to normal by creating acoustic and vibroacoustic interference at the border of enclosing structures of information activity objects are analysed.
The conceptual foundations of technical information protection, its basic principles are given, with the principal methods and means of ensuring information security for each of the possible leakage channels defined.
Downloads
References
Yarochkin, V. I. (1994). Texnicheskie kanaly` utechki informacii. Moskva: Institut povy`sheniya kvalifikacii informacionny`x rabotnikov.
Xorev, A. A. (1998). Zashhita informacii ot utechki po texnicheskim kanalam. Moskva: Gostexkomissiya Rossii.
Lastivka, H. I., & Shpatar, P. M. (2018). TEKhNIChNYI ZAKhYST INFORMATsII V INFORMATsIINYKh TA TELEKOMUNIKATsIINYKh SYSTEMAKh. Chernivtsi: Chernivetskyi natsionalnyi universytet. Retrieved from http://radiotech.cv.ua/documents/book/KONSPEKT_KANAL.pdf.
Yarutich, A. O. (2019). Zakhyst informatsii vid vytoku tekhnichnymy kanalamy. Nauka onlain: Mizhnarodnyi elektronnyi naukovyi zhurnal. (1). Retrieved from https://nauka-online.com/ua/publications/natsionalnaya-bezopasnost/2019/1/zahist-informatsiyi-vid-vitoku-tehnichnimi-kanalami
Xorev, A. A. (2008). Texnicheskaya zashhita informacii.1, Moskva: NPCz «Analitika».
Khoroshko, V. O., Cherednychenko, V. S., & Shelest, M. Y. (2008). Osnovy informatsiinoi bezpeky. Kyiv: DUIKT.
Buzov, G. A., Kalinin, S. V., & Kondrat`ev, A. V. (2005). Zashhita ot utechki informacii po texnicheskim kanalam. Moskva: Goryachaya liniya – Telekom.
Zajcev, A. P., Shelupanov, A. A., & Meshheryakov, R. V. (2009). Texnicheskie sredstva i metody` zashhity` informacii. Moskva: OOO «Izdatel`stvo Mashinostroenie». Retrieved from http://window.edu.ru/resource/611/63611/files/tsmzi.pdf.
Xorev, A. A. (2010). Texnicheskie kanaly` utechki informacii, obrabaty`vaemoj sredstvami vy`chislitel`noj texniki. Special`naya Texnika. (2). Retrieved from http://www.bnti.ru/showart.asp?aid=954&lvl=04.03.&p=1.
Karpov, A. V., & Lepeshkin, O. M. (2018). MODELIROVANIE TEXNICHESKIX KANALOV UTECHKI INFORMACZII NA RASPREDELENNYX OBEKTAX UPRAVLENIYA. International Journal of Advanced Studies, (1), 69-83. Retrieved from https://www.researchgate.net/publication/325322929_MODELIROVANIE_TEHNICESKIH_KANALOV_UTECKI_INFORMACII_NA_RASPREDELENNYH_OBEKTAH_UPRAVLENIA.
Globalnoe issledovanie utechek konfidentsialnoy informatsii v pervom polugodii 2019 goda. Retrieved from https://www.infowatch.ru/sites/default/files/report/analytics/russ/Global_Data_Leaks_Report_2019_half_year.pdf?rel=1
Issledovanie utechek informatsii ogranichennogo dostupa v gossektore. Mir – Rossiya. 2018 god. Retrieved from https://www.infowatch.ru/sites/default/files/analytics/files/%D0%90%D0%BD%D0%B0%D0%BB%D0%B8%D1%82%D0%B8%D1%87%D0%B5%D1%81%D0%BA%D0%B8%D0%B9%20%D0%BE%D1%82%D1%87%D0%B5%D1%82%20%D1%83%D1%82%D0%B5%D1%87%D0%BA%D0%B8%20%D0%B2%20%D0%B3%D0%BE%D1%81%D1%81%D0%B5%D0%BA%D1%82%D0%BE%D1%80%D0%B5.%202018.pdf
Macy Bayern. 5 major data breach predictions for 2019 Retrieved from https://www.techrepublic.com/article/5-major-data-breach-predictions-for-2019/
RD TPI 1.1-001-99 Technical protection of information on software-managed public PBX systems. General provisions. Approved by Order No. 26 of the Department of Special Communication Systems and Information Protection of the Security Service of Ukraine dd. 28.05.99.
RD TPI 2.5-001-99 Technical protection of information on software-managed public PBX systems. Specifications of functional security services. Approved by Order No. 26 of the Department of Special Communication Systems and Information Protection of the Security Service of Ukraine dd. 28.05.99.
RD TPI 4.7-001-2001 Technical protection of speech information in symmetric subscriber analog telephone lines. Means of determining the presence and the distance to the location of contact connection of technical intelligence tools. Guidelines for developing test methods. Approved by Order No. 11 of the Department of Special Communication Systems and Information Protection of the Security Service of Ukraine dd. 06.04.2001.
RD TPI P-001-2000 Means of active protection of speech information with acoustic and vibroacoustic radiation sources. Classification and general technical requirements. Guidance. Approved by Order No.41 of the Department of Special Communication Systems and Information Protection of the Security Service of Ukraine dd. 04.09.2000.
Regulations on technical information protection in Ukraine. Approved by Presidential Decree No. 1229 dd. 27.09.99.
Temporary recommendations for technical protection of information from leakage through channels of indirect electromagnetic radiation and interference. Approved by Order of the Department of Special Communication Systems and Information Protection dd. 09.06.95.
Published
How to Cite
Issue
Section
License
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).