Browse Definitions :
Definition

Faraday cage

A Faraday cage is a metallic enclosure that prevents the entry or escape of an electromagnetic field (EM field). An ideal Faraday cage consists of an unbroken, perfectly conducting shell. This ideal cannot be achieved in practice, but can be approached by using fine-mesh copper screening. For best performance, the cage should be directly connected to an earth ground.

Faraday cages are used in electronic labs where stray EM fields must be kept out. This is important in the testing of sensitive wireless receiving equipment. In addition, a Faraday cage can prevent the escape of the EM fields emitted by a cathode-ray-tube (CRT) computer monitor. Such fields can be intercepted and translated to allow hackers to remotely view on-screen data in real time without the need for wires, cables or cameras. This practice, known as van Eck phreaking, can also be used by government officials to view the computer activities of known criminals and certain criminal suspects.

A heavy-duty Faraday cage can protect anything inside against direct lightning strikes. When properly connected to an earth ground, the cage conducts the high current harmlessly to ground, and keeps the EM pulse from affecting personnel or hardware inside.

The Faraday Cage in this photo is located at the Boston Museum of Science. It protects the employee who is tasked with demonstrating the world's largest air-insulated Van de Graaff generator in the museum's Theater of Electricity.

This was last updated in April 2019

Continue Reading About Faraday cage

Networking
  • unshielded twisted pair (UTP)

    Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).

  • Multiprotocol Label Switching (MPLS)

    Multiprotocol Label Switching (MPLS) is a switching mechanism used in wide area networks (WANs).

  • computer network

    A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other.

Security
  • three-factor authentication (3FA)

    Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication ...

  • cyber espionage

    Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry out against a business or government ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

CIO
  • knowledge-based systems (KBSes)

    Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to ...

  • Sarbanes-Oxley Act

    The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.

  • project charter

    A project charter is a formal short document that states a project exists and provides project managers with written authority to...

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • sales development representative (SDR)

    A sales development representative (SDR) is an individual who focuses on prospecting, moving and qualifying leads through the ...

  • service level indicator

    A service level indicator (SLI) is a metric that indicates what measure of performance a customer is receiving at a given time.

  • customer data platform (CDP)

    A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that ...

Close