Features of the formation of TEMPEST in a computer keyboard from the point of view of ensuring information security
... features of the equipment used are established. Possible channels of unauthorized information retrieval, through the use of TEMPEST, are analyzed. Recommendations for the safe use of ps/2 keyboards in information systems are formed.
Persichkin A. A., Persichkina N. V., Shpilevaya S. G.
keyboard, interface, TEMPEST, Information Security, leak channel
31-37