Browse Definitions :
Definition

Faraday cage

A Faraday cage is a metallic enclosure that prevents the entry or escape of an electromagnetic field (EM field). An ideal Faraday cage consists of an unbroken, perfectly conducting shell. This ideal cannot be achieved in practice, but can be approached by using fine-mesh copper screening. For best performance, the cage should be directly connected to an earth ground.

Faraday cages are used in electronic labs where stray EM fields must be kept out. This is important in the testing of sensitive wireless receiving equipment. In addition, a Faraday cage can prevent the escape of the EM fields emitted by a cathode-ray-tube (CRT) computer monitor. Such fields can be intercepted and translated to allow hackers to remotely view on-screen data in real time without the need for wires, cables or cameras. This practice, known as van Eck phreaking, can also be used by government officials to view the computer activities of known criminals and certain criminal suspects.

A heavy-duty Faraday cage can protect anything inside against direct lightning strikes. When properly connected to an earth ground, the cage conducts the high current harmlessly to ground, and keeps the EM pulse from affecting personnel or hardware inside.

The Faraday Cage in this photo is located at the Boston Museum of Science. It protects the employee who is tasked with demonstrating the world's largest air-insulated Van de Graaff generator in the museum's Theater of Electricity.

This was last updated in April 2019

Continue Reading About Faraday cage

Networking
  • remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT ...

  • port address translation (PAT)

    Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 ...

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

Security
  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • governance, risk and compliance (GRC)

    Governance, risk and compliance (GRC) refers to an organization's strategy for handling the interdependencies among the following...

  • total risk

    Total risk is an assessment that identifies all the risk factors associated with pursuing a specific course of action.

CIO
  • digital platform

    A digital platform is a web-based structural software package that speeds and eases transactions among users.

  • transfer learning

    Transfer learning is a machine learning method where a model already developed for a task is reused in another task.

  • enterprise IT (enterprise-class IT)

    Enterprise-class IT (also known as enterprise-grade, or enterprise IT) is hardware, software and other IT services designed to ...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

  • Salesforce DX

    Salesforce DX, or SFDX, is a set of software development tools that lets developers build, test and ship many kinds of ...

Close