Yıl 2019, Cilt 5 , Sayı 3, Sayfalar 100 - 104 2019-09-30

Broad usage of Information and Communication Technologies (ICT) and the Internet have made cybersecurity a vital issue. One of the less known threat for cybersecurity is TEMPEST (Transient Electromagnetic Pulse Emanation Standard) which has become more apparent today. TEMPEST is an information security term that refers to the examination and control of unwanted electromagnetic energy emissions caused by electrical and electronic devices. As a result of TEMPEST attacks, confidential information such as state secrets, personal information such as bank passwords, and more information can be passed on to the attackers. Unlike other known cyber-attack methods, TEMPEST attack methods are kept secret and those who are exposed to TEMPEST attacks are not aware of these attacks. The concept of TEMPEST is a less known cybersecurity component which can cause much greater damage if the necessary cybersecurity measures are not taken. The purpose of this study is to present a review of TEMPEST attacks and countermeasures. The study also highlights the importance of using national cybersecurity products that passed the national TEMPEST cybersecurity testing certification.
Cybersecurity, TEMPEST, Electromagnetic Emission
  • [1] 2016-2019 Ulusal Siber Güvenlik Stratejisi, T.C. Ulaştırma, Denizcilik ve Haberleşme Bakanlığı.
  • [2] Çiftçi, H. (2017). Her Yönüyle Siber Savaş. TÜBİTAK Popüler Bilim Kitapları.
  • [3] Meral, M. (2008). Siber Savunma: Ülkeler ve Stratejiler. 3. Uluslararsı Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı.
  • [4] Aslay, F. (2017). Siber Saldırı Yöntemleri ve Türkiye’nin Siber Güvenlik Mevcut Durum Analizi. International Journal of Multidisciplinary Studies and Innovative Technologies (IJMSIT).
  • [5] Bilgin, S. ve diğ. (2013). Askeri ve Kamu Kuruluşlarına ait Binaların TEMPEST Güvenliği İçin Farklı Yapıda Dokuma Kumaşların Geliştirilmesi.
  • [6] Hongxin, Z. (2009). Computers&Security. Recognition of electro-magnetic leakage information from computer radiation with SVM.
  • [7] NSTISSI-7000, 1995. TEMPEST Countermeasures for Facilities. U.S. Department of Transportation.
  • [8] Bayraktar, G. (2014). Harbin Beşinci Boyutunun Yeni Gereksinimi: Siber İstihbarat.
  • [9] Cohen, F. (1997). Information System Defences: A Preliminary Classification Scheme. Computers & Security, 16 (1997) 94-l 14.
  • [10] Philippsohn, S. (2001). Trends in Cybercrime — An Overview of Current Financial Crimes On the Internet. Computers & Security, 20 (2001) 53-69.
  • [11] Anderson, R. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems. 2nd Edition. ISBN: 978-0-470-06852-6. Apr 2008. 1088 pages.
  • [12] Shotbolt, H. (2003). Several compromising-emanations based interception techniques and their implications.
  • [13] Garlick, D. (2005). TEMPEST and Electromagnetic Emanations Security: Is Not Only a Government Standard. GIAC Security Essentials Certification (GSEC) Practical Assignment Option One: Case Study in Information Security.
  • [14] Finne, T. (1996). The Information Security Chain in a Company. Institute for Advanced Management Systems Research QAMSR).
  • [15] Karlsson, J. 2003. TEMPEST Attacks. Master Thesis in Computer Science. Thesis no: MCS-2003:13. June 2003.
  • [16] FIPS PUB 140-2, 1994, Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication.
  • [17] Altıner, H., Şaykol, E. (2013). TEMPEST Saldırı Türleri Üzerine Tarihsel bir İnceleme. Beykent Üniversitesi Fen ve Mühendislik Bilimleri Dergisi. Cilt 6(2) 2013, 121 – 152.
  • [18] Kuhn, M. ve diğ. (1998). Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. University of Cambridge, Computer Laboratory, New Museums Site, Pembroke Street, Cambridge CB2 3QG, United Kingdom.
  • [19] Jacobs, B. (2009). Electronic Voting in the Netherlands: from early Adoption to early Abolishment. Digital Security group, Radboud University Nijmegen. Centre for Telematics and Information Technology, University of Twente.
  • [20] Erendor, M. (2016). Risk Toplumu ve Refleksif Modernleşme Çerçevesinde Siber Terörizm: Tanımlama ve Tipoloji Sorunu. IISN: 2587-1218.
Birincil Dil en
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Orcid: 0000-0002-0122-8512
Yazar: Hakan Aydın (Sorumlu Yazar)
Kurum: Department of Computer Engineering, Faculty of Engineering and Architecture, İstanbul Gelişim University, İstanbul, Turkey
Ülke: Turkey


Tarihler

Yayımlanma Tarihi : 30 Eylül 2019

Bibtex @araştırma makalesi { ijet579644, journal = {International Journal of Engineering Technologies IJET}, issn = {2149-0104}, eissn = {2149-5262}, address = {}, publisher = {İstanbul Gelişim Üniversitesi}, year = {2019}, volume = {5}, pages = {100 - 104}, doi = {10.19072/ijet.579644}, title = {TEMPEST Attacks and Cybersecurity}, key = {cite}, author = {Aydın, Hakan} }
APA Aydın, H . (2019). TEMPEST Attacks and Cybersecurity. International Journal of Engineering Technologies IJET , 5 (3) , 100-104 . Retrieved from https://dergipark.org.tr/tr/pub/ijet/issue/47283/579644
MLA Aydın, H . "TEMPEST Attacks and Cybersecurity". International Journal of Engineering Technologies IJET 5 (2019 ): 100-104 <https://dergipark.org.tr/tr/pub/ijet/issue/47283/579644>
Chicago Aydın, H . "TEMPEST Attacks and Cybersecurity". International Journal of Engineering Technologies IJET 5 (2019 ): 100-104
RIS TY - JOUR T1 - TEMPEST Attacks and Cybersecurity AU - Hakan Aydın Y1 - 2019 PY - 2019 N1 - DO - T2 - International Journal of Engineering Technologies IJET JF - Journal JO - JOR SP - 100 EP - 104 VL - 5 IS - 3 SN - 2149-0104-2149-5262 M3 - UR - Y2 - 2019 ER -
EndNote %0 International Journal of Engineering Technologies TEMPEST Attacks and Cybersecurity %A Hakan Aydın %T TEMPEST Attacks and Cybersecurity %D 2019 %J International Journal of Engineering Technologies IJET %P 2149-0104-2149-5262 %V 5 %N 3 %R %U
ISNAD Aydın, Hakan . "TEMPEST Attacks and Cybersecurity". International Journal of Engineering Technologies IJET 5 / 3 (Eylül 2019): 100-104 .
AMA Aydın H . TEMPEST Attacks and Cybersecurity. IJET. 2019; 5(3): 100-104.
Vancouver Aydın H . TEMPEST Attacks and Cybersecurity. International Journal of Engineering Technologies IJET. 2019; 5(3): 104-100.