Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.12 Security Configuration Guide

PDF

Electromagnetic Radiation Isolation

Security researchers have been able to access sensitive data wirelessly from a malware-infected system, thus overcoming network isolation.

FM signals have been sent to a mobile phone within 7 meters with an effective bandwidth of 13 to 60 bytes per second. Although the attack complexity is high, it can still render network isolation or a vault useless.

Follow these recommendations to mitigate malicious wireless data access:

  • Shield the vault from any electromagnetic radiation so that data cannot be accessed.
  • Do not allow mobile phones, which can act as transceivers, inside the physical vault.
    NOTE:If necessary, only allow approved mobile phones in the physical vault.
  • Ensure that all other systems are physically isolated from systems in the production network by at least 7 meters.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\