Talk With an Expert

Electromagnetic Attack: Is Your Infrastructure and Data at Risk?

Electromagnetic Attack: Is Your Infrastructure and Data at Risk? (PDF, 1.62MB)Published: 10 Aug, 2001
Created by:
Michael Hayden

You have worked hard to secure your network and data. You've got intrusion detection systems (IDS), backups, corporate firewalls, personal firewalls, honey pots, bullet-proof armoring and centralized logging. You've eliminated or minimized single point failures, installed redundant systems and are a believer of defense in depth. Your security policies and procedures are in order, and you have corporate or institutional buy-in as a reward. You are aware that the most important aspect of data and network security is physical security, so you keep things properly buttoned up behind locked doors and you control physical access. But now you hear the bad guys have RFWs, HPMs, TEDs, UWBs, EMPs , EMI, HEMPs and more. Is this stuff for real? And if it is, can you protect yourself and your systems from damage or total destruction from a perpetrator outside your perimeter defenses? It's time to think about these things before you fall victim to your own technology.