Search results for "cyber attacks"

showing 2 items of 2 documents

Arctic Connect Project and Cyber Security Control, ARCY

2019

The submarine communication cables form a vast network on the seabed and transmit massive amounts of data across oceans. They provide over 95% of international telecommunications — not via satellites as is commonly assumed. The global submarine network is the “backbone” of the Internet, and enables the ubiquitous use of mail, social media, phone and banking services. To these days no any other technology than submarine cables systems has not been such a strategic impact to our society without being known it as such by the people. This also means that it is at the same time a very interesting destination for hackers, cyber attackers, terrorist and state actors. They seek to gain access to in…

submarinescablescable communicationsea cablesoptical cablescyber attacks
researchProduct

Drones in cyber security environment

2019

Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…

elektroninen sodankäyntikybersodankäyntiintelligence and reconnaissancecyber securitysurveillancedroonittiedusteluunmanned aerial vehiclesmiehittämättömät ilma-aluksettarkkailucyber attacks
researchProduct