dc.contributor.author | Martin, Maxwell | |
dc.contributor.author | Sunmola, Funlade | |
dc.contributor.author | Lauder, David | |
dc.contributor.editor | Molina López, Jose Manuel | |
dc.date.accessioned | 2022-10-10T12:00:05Z | |
dc.date.available | 2022-10-10T12:00:05Z | |
dc.date.issued | 2022-09-18 | |
dc.identifier.citation | Martin , M , Sunmola , F , Lauder , D & Molina López , J M (ed.) 2022 , ' Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security † ' , Sensors , vol. 22 , no. 18 , 7064 . https://doi.org/10.3390/s22187064 | |
dc.identifier.issn | 1424-3210 | |
dc.identifier.other | Jisc: 644180 | |
dc.identifier.other | publisher-id: sensors-22-07064 | |
dc.identifier.uri | http://hdl.handle.net/2299/25796 | |
dc.description | © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). | |
dc.description.abstract | Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of the associated causal factors and their interrelationships. Several factors that can cause unintentional electromagnetic emanations that can lead to the compromise of ITE have been found in the literature. This paper confirms the list of causal factors reported in previous work, categorizes the factors as belonging to threat, vulnerability, or impact, and develops an interpretive structural model of the vulnerability factors. A participatory modelling approach was used consisting of focus groups of RF engineers. The resulting hierarchical structural model shows the relationships between factors and illustrates their relative significance. The paper concludes that the resulting model can motivate a deeper understanding of the structural relationship of the factors that can be incorporated in the RF engineers’ assessment process. Areas of future work are suggested. | en |
dc.format.extent | 18 | |
dc.format.extent | 2225149 | |
dc.language.iso | eng | |
dc.relation.ispartof | Sensors | |
dc.subject | Article | |
dc.subject | compromising emanations | |
dc.subject | TEMPEST | |
dc.subject | vulnerability likelihood | |
dc.subject | causal factors | |
dc.subject | interpretive structural modelling | |
dc.subject | fishbone diagram | |
dc.title | Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security † | en |
dc.contributor.institution | Department of Engineering and Technology | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.contributor.institution | Materials and Structures | |
dc.contributor.institution | Centre for Engineering Research | |
dc.contributor.institution | Centre for Future Societies Research | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.3390/s22187064 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |