Undersea optical cable network and cyber threats
Hummelholm, A. (2019). Undersea optical cable network and cyber threats. In T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 650-659). Academic Conferences International. Proceedings of the European conference on information warfare and security.
Authors
Date
2019Copyright
© The Author(s) 2019
Almost all services and most of the traditional services are totally dependent on the digital environment. Few users are aware of the revolutionary nature of modern technology. We use day-to-day real-time access to existing digital services in our home country or we use social media (Some) to communicate with friends locally or elsewhere in the world. We can communicate with them in real time with text messages or even through real-time video feed. People have the choice of millions of movies to watch anytime, anywhere. Modern communications connect data centers and data networks of different continents together, enabling real-time communications throughout the world. We can order different goods from all over the world, pay invoices electronically and get the goods delivered to our door. Companies use the same channels of communication for daily communications, trading, sending invitations to tender and transferring money through banks in real time. As a result of the developments described above, people and systems produce huge amounts of data which needs to be processed and stored. However, technical solutions for all new service environments are not yet in line with international standards and their connections to telecommunications and service networks are very diverse. Technically outdated solutions and new technologies are used simultaneously. Future information and communication systems need to be designed and adapted to work in this challenging business environment where security threats and cybercrime are constantly present. Each function has its own service and communication needs depending on the user group. These groups include design and maintenance staff, financial management staff, telecom operators, service provider staff, virtual service providers and operators, administrative agents, citizens, manufacturers, banks, etc. To date no other technology apart from submarine cables systems has had such a strategic impact to our society while at the same time remaining so badly understood by the general population. This means that it is also a very tempting target for hackers and state actors. They seek access to the sea cables and networks connecting continents to each other.
...
Publisher
Academic Conferences InternationalParent publication ISBN
978-1-912764-28-0Conference
European Conference on Cyber Warfare and SecurityIs part of publication
ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and SecurityISSN Search the Publication Forum
2048-8602Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/32272592
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Rising cyber threats targeting the banking sector
Keränen, Annu-Maria (2022)Teknologian kehittyminen johtaa uusiin innovaatioihin niin yritysten liiketoiminnassa kuin jokapäiväisessä elämässäkin. Teknologian kehittyessä kehittyvät myös kyberuhat. Pankkisektori kuuluu yhteiskunnan kriittiseen ... -
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
Rauhala, Juhani; Tyrväinen, Pasi; Zaidenberg, Nezer (IGI Global, 2020)The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and ... -
Users’ Psychopathologies : Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior
Woods, Naomi (Springer, 2022)The internet and digital technologies have become an integral part of people’s daily lives. The online world provides many benefits to billions of users globally. However, it also brings risks too, because it is easy for ... -
Valtiolliset kybervaikuttamisen keinot ja vaikutukset : case Kiina
Viljamaa, Juuso (2021)Tässä tutkielmassa avataan valtiollisia kybervaikuttamisen keinoja sekä vaikutuksia globaalilla tasolla. Tarkoituksena on kuvailla yleisimpiä hyökkäyskeinoja ja erilaisia kybervaikuttamisen tapoja perehtyen hyökkääjän ... -
Yli 75-vuotiaat ja kyberturvallisuus
Peltonen, Seija (2021)Yhteiskunnan digitalisoitumisen myötä kriittisten palvelujen ja toimintojen riippuvuus tietojärjestelmistä on korkea. Samanaikaisesti väestömme ikära-kenne muuttuu keskimääräisen eliniän pidentyessä ja eläkeikäisen väestön ...