Faraday Cage

A Faraday cage is a metal cage or enclosure that distributes an applied electrical charge evenly across its surface, protecting anything inside from exposure to electromagnetic fields or electrical charge. Invented in 1836 by Michael Faraday but previewed decades earlier by Benjamin Franklin in simpler form, Faraday cages hold electrical charge, but when an outside charge is applied, the electric fields cancel each other out. The inside of the cage, room, or enclosure remains free of any charge.

Faraday cages are used for many everyday items, including microwaves, where the cage protects users from many of the damaging electromagnetic fields within the enclosure. Vehicles and airplanes also utilize Faraday technology – if lightning strikes the exterior, the electrical field generated spreads across the surface of the vehicle or plane and the charges cancel each other, protecting passengers inside from being electrocuted.

Threats to Faraday cage security

Some businesses use Faraday cages to protect their computers or servers, attempting to shield data from outside electromagnetic forces. However, this method isn’t foolproof, as researchers from one Israeli university recently revealed. Although Faraday cages protect their interior from electromagnetic fields, ordinary magnetic fields can still pass through them. If sensitive data is being stored inside a large Faraday cage, such as in a data center, electromagnetic fields can’t penetrate the interior, but some magnetic fields can.

The Israeli researchers identified two methods of extracting data stored within a Faraday cage. The ODINI method manipulates the magnetic output of the CPU, where data is being processed, and allows thieves to extract data through a magnetic field. MAGNETO, the second method, uses a smartphone application with a magnetic field feature to extract data. The methods are similar, but MAGNETO requires a thief to be closer to a Faraday cage to steal the data within because they’re using a smartphone app. Researchers warn that those who use Faraday cages to protect sensitive data should be aware of these weaknesses.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...