Committed to connecting the world

  •  

 

ITU-T Recommendations

Search by number:
Others:
Skip Navigation Links
Content search
Advanced search
Provisional name
ISO/IEC number
Formal description
Study Groups tree viewExpand Study Groups tree view

ITU-T K Suppl. 5 (04/2016)

عربي | 中文 | English | Español | Français | Русский
ITU-T K.81 - Estimation examples of the high-power electromagnetic threat and vulnerability for telecommunication systems
When information security is managed, it is necessary to evaluate and mitigate the threat to either the equipment or the site. This threat is related to "vulnerability" and "confidentiality" in Information Security Management System (ISMS).

Supplement 5 to ITU-T K-series Recommendations (ITU-T K.81) presents evaluation and calculation examples for the threat of an intentional HPEM attack. The HPEM sources considered are those presented in IEC 61000-2-13, as well as some additional sources that have emerged more recently.

This document also provides information on the vulnerability of telecom equipment. And the example of vulnerability is provided. The equipment is desirable to meet the immunity requirements presented in Recommendation ITU-T K.48 and relevant resistibility requirements, such as those described in Recommendations ITU-T K.20, ITU-T K.21 and ITU-T K.45.
Citation: http://handle.itu.int/11.1002/1000/12965
Approval date: 2016-04-27
Approval process:Agreed
Status: In force
Maintenance responsibility: ITU-T Study Group 5
Further details: Patent statement(s)
Development history
Ed. ITU-T Recommendation Status Summary Table of Contents Download
1 K Suppl. 5 (04/2016) In force
here
here
here