Show simple item record

dc.contributor.authorHummelholm, Aarne
dc.contributor.editorCruz, Tiago
dc.contributor.editorSimoes, Paulo
dc.date.accessioned2020-01-07T07:33:47Z
dc.date.available2020-01-07T07:33:47Z
dc.date.issued2019
dc.identifier.citationHummelholm, A. (2019). Undersea optical cable network and cyber threats. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 650-659). Academic Conferences International. Proceedings of the European conference on information warfare and security.
dc.identifier.otherCONVID_32272592
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67103
dc.description.abstractAlmost all services and most of the traditional services are totally dependent on the digital environment. Few users are aware of the revolutionary nature of modern technology. We use day-to-day real-time access to existing digital services in our home country or we use social media (Some) to communicate with friends locally or elsewhere in the world. We can communicate with them in real time with text messages or even through real-time video feed. People have the choice of millions of movies to watch anytime, anywhere. Modern communications connect data centers and data networks of different continents together, enabling real-time communications throughout the world. We can order different goods from all over the world, pay invoices electronically and get the goods delivered to our door. Companies use the same channels of communication for daily communications, trading, sending invitations to tender and transferring money through banks in real time. As a result of the developments described above, people and systems produce huge amounts of data which needs to be processed and stored. However, technical solutions for all new service environments are not yet in line with international standards and their connections to telecommunications and service networks are very diverse. Technically outdated solutions and new technologies are used simultaneously. Future information and communication systems need to be designed and adapted to work in this challenging business environment where security threats and cybercrime are constantly present. Each function has its own service and communication needs depending on the user group. These groups include design and maintenance staff, financial management staff, telecom operators, service provider staff, virtual service providers and operators, administrative agents, citizens, manufacturers, banks, etc. To date no other technology apart from submarine cables systems has had such a strategic impact to our society while at the same time remaining so badly understood by the general population. This means that it is also a very tempting target for hackers and state actors. They seek access to the sea cables and networks connecting continents to each other.en
dc.format.extent884
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on information warfare and security
dc.rightsIn Copyright
dc.subject.othercommunication
dc.subject.othercontinents
dc.subject.othercybercrime
dc.subject.otherhackers
dc.subject.othersubmarine cables
dc.titleUndersea optical cable network and cyber threats
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202001071044
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-28-0
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange650-659
dc.relation.issn2048-8602
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s) 2019
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysokyberrikollisuus
dc.subject.ysokyberturvallisuus
dc.subject.ysotieto- ja viestintärikokset
dc.subject.ysomerikaapelit
dc.subject.ysoviestintä
dc.subject.ysohakkerit
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p29491
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p8694
jyx.subject.urihttp://www.yso.fi/onto/yso/p37991
jyx.subject.urihttp://www.yso.fi/onto/yso/p36
jyx.subject.urihttp://www.yso.fi/onto/yso/p22619
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright