[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Miller, 2006 - Google Patents

Optical illusion

Miller, 2006

View PDF
Document ID
11273037613177445033
Author
Miller S
Publication year
Publication venue
Information security

External Links

Snippet

There have been few public reports of fiber hacks: In 2000, three main trunk lines of Deutsche Telekom were breached at Frankfurt Airport in Germany. In 2003, an illegal eavesdropping device was discovered hooked into Verizon's optical network; it was …
Continue reading at www.oysteroptics.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength

Similar Documents

Publication Publication Date Title
Petrenko et al. Protection model of PCS of subway from attacks type «wanna cry»,«petya» and «bad rabbit» IoT
Plėta et al. Cyber-attacks to critical energy infrastructure and management issues: Overview of selected cases
Venkatachary et al. Cybersecurity and cyber terrorism-in energy sector–a review
KR101574198B1 (en) Hacking monitoring system of optical cable
US8494313B2 (en) Monitoring eDC polarization inverse filter coefficients to identify real-time physical intrusion into a core or metro optical network
Choo Zombies and botnets.
EP3729773B1 (en) One-way data transfer device with onboard system detection
KR101871406B1 (en) Method for securiting control system using whitelist and system for the same
Sabev et al. Cybersecurity analysis of wind farm SCADA systems
KR101553246B1 (en) Hacking security system of optical cable using optical line monitoring
US20140091929A1 (en) Systems and Methods for Secure Alarmed Armored Protective Distribution Systems and Management
Hathaway Leadership and responsibility for cybersecurity
Miller Optical illusion
Transportation yber Security i OChaII ‘enges
Miller Hacking at the Speed of Light
KR102532210B1 (en) The fixed @(Crazy A)hidden camera detection system
Everett Tapping into fibre optic cables
KR20230171041A (en) The quantum random number security combination wiring panel and Hybrid quantum random number security communication wiring panel and Smart broadcasting system
Banjac et al. Securing data on fiber optic transmission lines
UMOH et al. The Vulnerability of Fiber-Optics Communication Systems: The Role of Optical Tapping
Slay et al. A security architecture for SCADA networks
US10122684B1 (en) Local area network electronic perimeter security
Jacoba et al. Cybersecurity of Smart Grids: Attacks and Defenses of the Smart Meters in an Advanced Metering Infrastructure (AMI)
Sayegh Predicting what 2022 holds for cybersecurity
Sanati et al. A Comprehensive Review of Cyber Security Enhancements for PMU Communications in Microgrids