Committed to connecting the world

  •  
wtisd

ITU-T Recommendations

Search by number:
Others:
Skip Navigation Links
Content search
Advanced search
Provisional name
Equivalent number
Formal description
Study Groups tree viewExpand Study Groups tree view

ITU-T K.87 (11/2011)

عربي | 中文 | English | Español | Français | Русский
Guide for the application of electromagnetic security requirements - Overview
General guidelines of information security management for telecommunications organizations are presented in Recommendation ITU-T X.1051, which is based on ISO/IEC 27001 and ISO/IEC 27002. In an information security management system (ISMS) based on Recommendation X.1051, physical security is a key issue, as shown for example in the following text presented in Recommendation X.1051:

"a site whose environment is least susceptible to damage from strong electromagnetic field shall be selected for communication centres; where a site is chosen that is exposed to strong electromagnetic fields, appropriate measures should be taken to protect telecommunications equipment rooms with electromagnetic shields;"

"controls should be adopted to minimize the risk of potential physical threats, e.g., theft, fire, explosives, smoke, water (or water supply failure), dust, vibration, chemical effects, electrical supply interference, communications interference, electromagnetic radiation, and vandalism[.]"

When security is managed considering the quoted passages, the threat to equipment or site should be evaluated and mitigated. The threat is related to "vulnerability" and "confidentiality" in ISMS.

This Recommendation, Recommendation ITU-T K.87, outlines electromagnetic security risks of telecommunication equipment and illustrates how to assess and prevent those risks, in order to manage ISMS in accordance with Recommendation ITU-T X.1051. Major electromagnetic security risks addressed in this Recommendation are as follows:
• natural electromagnetic (EM) threats (e.g., lightning);
• unintentional interference (i.e., electromagnetic interference, EMI);
• intentional interference (i.e., intentional electromagnetic interference, IEMI);
• deliberate EM attacks via high-altitude electromagnetic pulse (HEMP);
• deliberate high-power electromagnetic (HPEM) attacks;
• information leakage from EM emanation (i.e., electromagnetic security, EMSEC).
Citation: https://handle.itu.int/11.1002/1000/11426
Series title: K series: Protection against interference
Approval date: 2011-11-13
Provisional name:K.sec
Approval process:AAP
Status: Superseded
Maintenance responsibility: ITU-T Study Group 5
Further details: Patent statement(s)
Development history
[5 related work items in progress]