Features of the formation of TEMPEST in a computer keyboard from the point of view of ensuring information security
... unauthorized information retrieval, through the use of TEMPEST, are analyzed. Recommendations for the safe use of ps/2 keyboards in information systems are formed.
Persichkin A. A., Persichkina N. V., Shpilevaya S. G.
keyboard, interface, TEMPEST, Information Security, leak channel
31-37
On the possibility of analytical detection of the TEMPEST signal in HDMI video interfaces
... HDMI video interfaces by means of TEMPEST was carried out. In accordance with the results of the analysis, a theoretical assumption was put forward and practically proved later.
Shpilevoy A. A., Persichkin A. A.
video interface, TEMPEST, Information Security, leak channel, HDMI, digital video interface
34-39