I've heard that there are issues with the security of fiber optic cables. What best practices should be implemented...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
when using fiber connections?
Generally speaking, the issues surrounding fiber optic cable security are lower risk than those facing users of copper cable. Copper cables naturally produce electromagnetic emissions that may be easily tapped in a clandestine fashion, allowing attackers to intercept network packets and communications across the cables. Fiber optic cables, on the other hand, rely upon the use of light rather than electricity, and require more specialized equipment to tap them.
That said, the risk still remains that someone can tap into a fiber optic connection, and it would be extremely difficult to detect such a tap without conducting a physical inspection of the cable. Therefore, you should secure fiber in the same manner as you would secure copper media. Specifically, you should:
- Place all of your fiber runs in secure locations, wherever possible. Use a conduit to prevent damage to the cable and provide a layer of protection against those wishing to gain access to the cable.
- Pay particular attention to locations where the cable terminates. The easiest place to insert a tap is a location where the data is readily accessible, such as wiring closets, public areas, junction boxes and similar locations.
- Use encryption for sensitive data. The use of encryption adds an additional layer of security that protects enterprise data in the event an attacker does gain access to a fiber run.
In conclusion, treat fiber runs in the same manner as you treat your copper ones. If you are unable to guarantee the physical security of the media, use encryption to provide logical security.
Dig Deeper on Network Device Management
Related Q&A from Mike Chapple
Vulnerability scanning tools are necessary to be fully compliant with PCI DSS, but the tools need to come from a PCI DSS Approved Scanning Vendor. ...continue reading
Healthcare clearinghouses like Mass HIway are a new trend in health IT, but what are the security implications? Expert Mike Chapple explains what you...continue reading
The FFIEC Cybersecurity Assessment Tool has faced harsh criticism since its 2015 release. Expert Mike Chapple reviews the tool and how it can be ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.