Committed to connecting the world

  •  

ITU-T work programme

[2013-2016] : [SG5] : [Q10/5]

[Declared patent(s)]  - [Publication]

Work item: K.Suppl.5 (ex to K.81)
Status: Agreed on 2016-04-27 
Approval process: Agreement
Type of work item: Supplement
Version: New
Provisional name: to K.81
Equivalent number: -
Timing: -
Liaison: -
Subject/title: K.Suppl. 5 - ITU-T K.81 - Estimation examples of the high-power electromagnetic threat and vulnerability for telecommunication systems
Summary: When information security is managed, it is necessary to evaluate and mitigate the threat to either the equipment or the site. This threat is related to "vulnerability" and "confidentiality" in Information Security Management System (ISMS). Supplement 5 to ITU-T K-series Recommendations (ITU-T K.81) presents evaluation and calculation examples for the threat of an intentional HPEM attack. The HPEM sources considered are those presented in IEC 61000-2-13, as well as some additional sources that have emerged more recently. This document also provides information on the vulnerability of telecom equipment. And the example of vulnerability is provided. The equipment is desirable to meet the immunity requirements presented in Recommendation ITU-T K.48 and relevant resistibility requirements, such as those described in Recommendations ITU-T K.20, ITU-T K.21 and ITU-T K.45.
Comment: -
Base text(s):
Contact(s):
ITU-T A.5 reference(s):
Generate A.5 drat TD
-
[Submit new A.5 reference ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2016-06-16 17:21:12
Last update: 2016-06-29 17:25:00