You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
Strong encryption L?solutions should preferably be in fiber optic networks
  Add date: 10/21/2010   Publishing date: 10/21/2010   Hits: 26
Total 2 pages, Current page:1, Jump to page:
 
A new IDC Technology Assessment ver?has published on the dangers of illegal optical mission-critical and sensitive information of tapping, as it passes through fiber optic networks. The report, entitled "Fiber optic networks is the security for a nice-T?Subtlety?"IDC Research Analyst says Romain Fouchereau "Networks of fiber-optic cable was the fastest, most reliable?thirtieth and safest way of passing data over the network traffic expected for decades. This call was for many wrongly?Years with the advent of low cost and new technologies to steal data easy to train?to hackers accessible. "Fouchereau, a specialist in the firewall / VPN, IDS / IPS, and Unified Threat Management, convictions "Industrial espionage is real and must be taken into account, the PI?ne of security for any organization. can secure the network in the interior is not enough, the data goes from one place to another Outgoing?rt and vulnerability must be addressed. "Including The report sites examples?Lich H?hne in optical networks from Verizon and Deutsche Telekom and a bigHack it and violation of the optical data in the supermarket chain Hannaford, which resulted in the theft of some 4.2 million credit and debit cards.
Fouchereau says: There unm?possible, the entire fiber optic network, the only real L?solution for Pr?prevention control to protect information is to encrypt the data before it goes over the net. At this point the only thing that information is looted to prevent industrial espionage, if the encryption makes the data unusable by hackers stole -. ""Because of the sensitive nature of information to financial institutions, is business?Insurance?Public Administration, or pharmaceutical and chemical industry - is gr??ter importance that data protection and reliability?permeability of the information submitted by weight?ensured, as the one?tze and risks are high. it "A?High appropriate. Thomas Meier, CEO of InfoGuard leading performance encryption L?solutions, commented: "This report is good for the economy as a whole, as it states in clear and unambiguous, that the high-risk enterprise data w?while protecting the transmission, particularly since more and more companies ben on resources?, Transparent processes to capture new business?fts or compliance requirements. ""optical piracy has existed for too many?Years, but few people are willing to openly discuss the fact that fiber connections are not secure as the service providers want us to believe ", Says Meier.
Networks of fiber-optic cable was the fastest, most reliable?evenly and secure transport of data over the network for decades considered. This call was for many wrongly?Years with the advent of new technologies and low costs is that the theft of data easy to train?to hackers accessible. In industries such as banking, insurance, pharmaceuticals and government, the transmitted data of h?chster sensitivity and k?nnte have disastrous consequences if they wrong in the H?walls fell. The recording and hacking technology to someone to be with fiber optic cables are unlikely to be detected much easier than ever before. Most cable networks is relatively easy to achieve because of maintenance and protection requirements are often very weak mechanically. Once the fiber is white?, Extract it hacks in optical networks capable of the light from the ultra-thin fibers -. There are three types of optical methods tap: the splicing?-Transition, the g?REGARDLESS way to take advantage of fiber optics - a break in the cable through the device, check with the help of the data k?can be made. Most of the company?Studies have splicepoints preinstalled Y-bridges in their fiber optic networks for maintenance. Hacker k?can easily abuse this service points.

 
Other pages: : 1 * 2 * Next>>
Prev:ConvexSoft DJ Audio Mixer Denial of Service Next:U.S. still more spam than any other country relay

Comment:

Category: Home > hacker course