Browse Definitions :
Definition

Faraday cage

A Faraday cage is a metallic enclosure that prevents the entry or escape of an electromagnetic field (EM field). An ideal Faraday cage consists of an unbroken, perfectly conducting shell. This ideal cannot be achieved in practice, but can be approached by using fine-mesh copper screening. For best performance, the cage should be directly connected to an earth ground.

Faraday cages are used in electronic labs where stray EM fields must be kept out. This is important in the testing of sensitive wireless receiving equipment. In addition, a Faraday cage can prevent the escape of the EM fields emitted by a cathode-ray-tube (CRT) computer monitor. Such fields can be intercepted and translated to allow hackers to remotely view on-screen data in real time without the need for wires, cables or cameras. This practice, known as van Eck phreaking, can also be used by government officials to view the computer activities of known criminals and certain criminal suspects.

A heavy-duty Faraday cage can protect anything inside against direct lightning strikes. When properly connected to an earth ground, the cage conducts the high current harmlessly to ground, and keeps the EM pulse from affecting personnel or hardware inside.

The Faraday Cage in this photo is located at the Boston Museum of Science. It protects the employee who is tasked with demonstrating the world's largest air-insulated Van de Graaff generator in the museum's Theater of Electricity.

This was last updated in April 2019

Continue Reading About Faraday cage

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close