Summary

When information security is managed, it is necessary to evaluate and mitigate the threat to either the equipment or the site. This threat is related to "vulnerability" and "confidentiality" in information security management system (ISMS).

Supplement 5 to ITU-T K-series Recommendations presents evaluation and calculation examples for the threat of an intentional high-altitude electromagnetic pulse (HPEM) attack. The HPEM sources considered are those presented in IEC 61000-2-13, as well as some additional sources that have emerged more recently.

This Supplement also provides information on the vulnerability of telecom equipment, and presents the example of vulnerability. It is desirable that the equipment meets the immunity requirements presented in Recommendation ITU-T K.48 and relevant resistibility requirements, such as those described in Recommendations ITU-T K.20, ITU-T K.21 and ITU-T K.45.