Shopping Cart

No products in the cart.

IEEE 1642 2015

$37.38

IEEE Recommended Practice for Protecting Publicly Accessible Computer Systems from Intentional Electromagnetic Interference (IEMI)

Published By Publication Date Number of Pages
IEEE 2015 39
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Active. Appropriate electromagnetic threat levels, protection methods, monitoring techniques, and test techniques for specific classes of computer equipment are established. This equipment is expected to be accessible to the public at ranges less than 100 m, and the loss of operation of the equipment due to intentional electromagnetic interference is expected to cause losses (both financial and of confidence) to businesses operating computer equipment, which are providing services to the public or to private companies. The principle class of equipment to be considered in this recommended practice includes fixed (non-mobile) computer equipment. Examples include automated teller machines; electronic cash registers at stores; computer equipment in banks and at airports; computer equipment controlling traffic flow; computer equipment controlling communications or allowing Internet access; computer equipment providing police, fire, and security services; computer equipment controlling the operation of the power grid (including smart meters); computer equipment operating in hospitals; etc.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 1642™-2015 Front cover
3 Title page
5 Important Notices and Disclaimers Concerning IEEE Standards Documents
8 Participants
10 Introduction
11 Contents
13 IMPORTANT NOTICE
1. Overview
1.1 Scope
14 1.2 Purpose
1.3 Background
15 2. Normative references
3. Definitions, acronyms, and abbreviations
3.1 Definitions
17 3.2 Acronyms and abbreviations
4. Description of the IEMI threat
4.1 Introduction to the threat
19 4.2 Threat levels
21 4.3 Examples of equipment susceptibilities to radiated threats
23 4.4 Examples of equipment susceptibilities to conduct threats
27 4.5 Summary of IEMI threat level and equipment susceptibilities
4.5.1 Summary of IEMI threat levels
28 4.5.2 Summary of equipment susceptibility levels
5. Types of equipment and systems to be protected
29 6. Protection methods
6.1 Protection approaches
6.2 Security approach
6.3 Electromagnetic approach
30 6.3.1 Shielding
6.3.2 Penetration control for metallic cables and the use of fiber optics
6.3.3 Resonance reduction
6.3.4 Fault-tolerant computation
6.3.5 Qualification of protective measures and periodic verification
31 7. Monitors and alarms
33 8. Recommended protection approach
9. Test methods
9.1 Equipment-level test methods
34 9.2 Rack-level test methods
9.3 Building-level test methods
35 Annex A (informative) Bibliography
39 Back cover
IEEE 1642 2015
$37.38