dc.contributor.author | Hummelholm, Aarne | |
dc.contributor.editor | Cruz, Tiago | |
dc.contributor.editor | Simoes, Paulo | |
dc.date.accessioned | 2020-01-07T07:33:47Z | |
dc.date.available | 2020-01-07T07:33:47Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Hummelholm, A. (2019). Undersea optical cable network and cyber threats. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 650-659). Academic Conferences International. Proceedings of the European conference on information warfare and security. | |
dc.identifier.other | CONVID_32272592 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/67103 | |
dc.description.abstract | Almost all services and most of the traditional services are totally dependent on the digital environment. Few users are aware of the revolutionary nature of modern technology. We use day-to-day real-time access to existing digital services in our home country or we use social media (Some) to communicate with friends locally or elsewhere in the world. We can communicate with them in real time with text messages or even through real-time video feed. People have the choice of millions of movies to watch anytime, anywhere. Modern communications connect data centers and data networks of different continents together, enabling real-time communications throughout the world. We can order different goods from all over the world, pay invoices electronically and get the goods delivered to our door. Companies use the same channels of communication for daily communications, trading, sending invitations to tender and transferring money through banks in real time. As a result of the developments described above, people and systems produce huge amounts of data which needs to be processed and stored. However, technical solutions for all new service environments are not yet in line with international standards and their connections to telecommunications and service networks are very diverse. Technically outdated solutions and new technologies are used simultaneously. Future information and communication systems need to be designed and adapted to work in this challenging business environment where security threats and cybercrime are constantly present. Each function has its own service and communication needs depending on the user group. These groups include design and maintenance staff, financial management staff, telecom operators, service provider staff, virtual service providers and operators, administrative agents, citizens, manufacturers, banks, etc. To date no other technology apart from submarine cables systems has had such a strategic impact to our society while at the same time remaining so badly understood by the general population. This means that it is also a very tempting target for hackers and state actors. They seek access to the sea cables and networks connecting continents to each other. | en |
dc.format.extent | 884 | |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European conference on information warfare and security | |
dc.rights | In Copyright | |
dc.subject.other | communication | |
dc.subject.other | continents | |
dc.subject.other | cybercrime | |
dc.subject.other | hackers | |
dc.subject.other | submarine cables | |
dc.title | Undersea optical cable network and cyber threats | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202001071044 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-912764-28-0 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 650-659 | |
dc.relation.issn | 2048-8602 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © The Author(s) 2019 | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | kyberrikollisuus | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | tieto- ja viestintärikokset | |
dc.subject.yso | merikaapelit | |
dc.subject.yso | viestintä | |
dc.subject.yso | hakkerit | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p29491 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p8694 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p37991 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p36 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p22619 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A4 | |