Electromagnetic Attack: Is Your Infrastructure and Data at Risk?

You have worked hard to secure your network and data. You've got intrusion detection systems (IDS), backups, corporate firewalls, personal firewalls, honey pots, bullet-proof armoring and centralized logging. You've eliminated or minimized single point failures, installed redundant systems and are...
By
Michael Hayden
August 10, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg