23 February 2005 Security of information in IT systems
Author Affiliations +
The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Malgorzata Kaliczynska, Malgorzata Kaliczynska, } "Security of information in IT systems", Proc. SPIE 5775, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments III, (23 February 2005); doi: 10.1117/12.610770; https://doi.org/10.1117/12.610770


Improved security monitoring method for network bordary
Proceedings of SPIE (March 19 2013)
New security system for ID certificates in IT society
Proceedings of SPIE (June 02 2004)
ML IKE a multi layer IKE protocol for TCP...
Proceedings of SPIE (April 02 2010)
An improved anti-leech mechanism based on session identifier
Proceedings of SPIE (January 13 2012)
Analysis on the security of cloud computing
Proceedings of SPIE (February 04 2011)

Back to Top