Concerns about the security of internet services delivered using “third party fibre optics” have recently been voiced by the federal government.

To ensure the safety and security of sensitive data, the government has distributed a circular to each of its departments, provinces, federal ministries, and divisions. The circular emphasises “dark fiber” as a more secure option for data transmission.

Concerns about the security of internet services delivered using “third party fibre optics” have recently been voiced by the federal government.

The government has determined that these connections are unsafe, and steps have been taken to address the issue. The circular focuses on how many institutions and government agencies rely on private fibre optic networks to offer internet access.

However, it does raise concerns about possible problems that could arise from using such connectivity, particularly in relation to data theft and unauthorised access.

The vulnerability of data transmission over optical fibre connections is a particular source of concern.

In order to significantly reduce the risk of data theft and unauthorised access, the circular suggests using “dark fiber” as a solution to address these concerns.

Dark fibre is an optical fibre network that can be set aside for private and secure data transmission because it is dormant or unlit. By using dark fibre connections, the government hopes to increase the security and privacy of sensitive data transferred over the internet.

The federal government’s action serves as an example of its dedication to protecting private information and upholding the dependability of communication channels. By encouraging the use of dark fibre, the government hopes to lessen potential security risks associated with third-party fibre optics and strengthen the protection of crucial government data.

Unauthorized access is when someone uses another person’s account or other means to gain access to a website, programme, server, service, or other system. Unauthorized access would be, for instance, if someone repeatedly tried to log into a user account that wasn’t theirs by guessing the password or username until they succeeded.

A user trying to access a part of a system they shouldn’t be accessing could also gain unauthorised access. They would be prevented from entering that area and might see a message about unauthorised access.