IEEE 1642 2015
$37.38
IEEE Recommended Practice for Protecting Publicly Accessible Computer Systems from Intentional Electromagnetic Interference (IEMI)
Published By | Publication Date | Number of Pages |
IEEE | 2015 | 39 |
New IEEE Standard – Active. Appropriate electromagnetic threat levels, protection methods, monitoring techniques, and test techniques for specific classes of computer equipment are established. This equipment is expected to be accessible to the public at ranges less than 100 m, and the loss of operation of the equipment due to intentional electromagnetic interference is expected to cause losses (both financial and of confidence) to businesses operating computer equipment, which are providing services to the public or to private companies. The principle class of equipment to be considered in this recommended practice includes fixed (non-mobile) computer equipment. Examples include automated teller machines; electronic cash registers at stores; computer equipment in banks and at airports; computer equipment controlling traffic flow; computer equipment controlling communications or allowing Internet access; computer equipment providing police, fire, and security services; computer equipment controlling the operation of the power grid (including smart meters); computer equipment operating in hospitals; etc.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 1642™-2015 Front cover |
3 | Title page |
5 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
8 | Participants |
10 | Introduction |
11 | Contents |
13 | IMPORTANT NOTICE 1. Overview 1.1 Scope |
14 | 1.2 Purpose 1.3 Background |
15 | 2. Normative references 3. Definitions, acronyms, and abbreviations 3.1 Definitions |
17 | 3.2 Acronyms and abbreviations 4. Description of the IEMI threat 4.1 Introduction to the threat |
19 | 4.2 Threat levels |
21 | 4.3 Examples of equipment susceptibilities to radiated threats |
23 | 4.4 Examples of equipment susceptibilities to conduct threats |
27 | 4.5 Summary of IEMI threat level and equipment susceptibilities 4.5.1 Summary of IEMI threat levels |
28 | 4.5.2 Summary of equipment susceptibility levels 5. Types of equipment and systems to be protected |
29 | 6. Protection methods 6.1 Protection approaches 6.2 Security approach 6.3 Electromagnetic approach |
30 | 6.3.1 Shielding 6.3.2 Penetration control for metallic cables and the use of fiber optics 6.3.3 Resonance reduction 6.3.4 Fault-tolerant computation 6.3.5 Qualification of protective measures and periodic verification |
31 | 7. Monitors and alarms |
33 | 8. Recommended protection approach 9. Test methods 9.1 Equipment-level test methods |
34 | 9.2 Rack-level test methods 9.3 Building-level test methods |
35 | Annex A (informative) Bibliography |
39 | Back cover |