CarderPlanet
Professional
- Messages
- 2,552
- Reaction score
- 676
- Points
- 83
A random hook or anchor is not the only threat to the World Wide Web.
According to ENISA, at certain points in time, up to 97% of all Internet traffic generated around the world passes through underwater Internet cables lying at the bottom of the seas and oceans. Such cables are an essential element of the global Internet infrastructure, and their protection from both cyber attacks, physical impact and other threats is extremely important.
Even a short-term failure of underwater cables can cause large-scale cyber incidents. Weak points in the operation of this infrastructure are the connection stations of these cables, as well as underwater areas with their high concentration.
Underwater cable repairs are complex, time-consuming, and require specialized vessels.
According to the International Committee for the Protection of Cables 2022 report, most cable incidents are accidental and involve anchoring and fishing. But there is also a tendency for a constant increase in the volume of Internet traffic passing through these cables, which causes an increase in load and periodic failures.
You should also not forget about malicious influence. Although cable tapping is considered unlikely at sea depths, data access at interconnection stations is quite real and a current threat.
Submarine cables can fall under the jurisdiction of a wide range of regulatory regimes, laws, and authorities. At the national level, telecommunications authorities, cybersecurity agencies, border guards, and the military can protect them. In the private sector, the subsea cable ecosystem includes cable owners and operators, suppliers, and cable maintenance companies.
ENISA has published this report to support EU national authorities that monitor telecommunications networks and key Internet infrastructure. Submarine cables are specifically mentioned in the NIS2 directive and should be considered in national cybersecurity strategies.
Despite all the apparent reliability of the global network, it remains vulnerable to natural phenomena and human actions. Taking care of the security and reliability of this infrastructure is a task that requires joint efforts of the international community.
According to ENISA, at certain points in time, up to 97% of all Internet traffic generated around the world passes through underwater Internet cables lying at the bottom of the seas and oceans. Such cables are an essential element of the global Internet infrastructure, and their protection from both cyber attacks, physical impact and other threats is extremely important.
Even a short-term failure of underwater cables can cause large-scale cyber incidents. Weak points in the operation of this infrastructure are the connection stations of these cables, as well as underwater areas with their high concentration.
Underwater cable repairs are complex, time-consuming, and require specialized vessels.
According to the International Committee for the Protection of Cables 2022 report, most cable incidents are accidental and involve anchoring and fishing. But there is also a tendency for a constant increase in the volume of Internet traffic passing through these cables, which causes an increase in load and periodic failures.
You should also not forget about malicious influence. Although cable tapping is considered unlikely at sea depths, data access at interconnection stations is quite real and a current threat.
Submarine cables can fall under the jurisdiction of a wide range of regulatory regimes, laws, and authorities. At the national level, telecommunications authorities, cybersecurity agencies, border guards, and the military can protect them. In the private sector, the subsea cable ecosystem includes cable owners and operators, suppliers, and cable maintenance companies.
ENISA has published this report to support EU national authorities that monitor telecommunications networks and key Internet infrastructure. Submarine cables are specifically mentioned in the NIS2 directive and should be considered in national cybersecurity strategies.
Despite all the apparent reliability of the global network, it remains vulnerable to natural phenomena and human actions. Taking care of the security and reliability of this infrastructure is a task that requires joint efforts of the international community.