SlideShare a Scribd company logo
1 of 14
Download to read offline
OPTICAL FIBERS
What is Optical
Fiber?
● Optical fiber is the technology associated with
data transmission using light pulses travelling
along with a long fiber which is usually made of
plastic or glass.
● Optical fibers are also unaffected by
electromagnetic interference. The fiber optical
cable uses the application of total internal
reflection of light.
● The fibers are designed such that they facilitate
the propagation of light along with the optical
fiber depending on the requirement of power and
distance of transmission.
TYPES OF OPTICAL
FIBRES:
The types of optical fibers depend on the refractive index, materials
used, and mode of propagation of light.
The classification based on the refractive index is as follows:
● Step Index Fibers: It consists of a core surrounded by the
cladding, which has a single uniform index of refraction.
● Graded Index Fibers: The refractive index of the optical fiber
decreases as the radial distance from the fiber axis increases.
The classification based on the materials used is as follows:
● Plastic Optical Fibers: The poly methyl methacrylate is used
as a core material for the transmission of the light.
● Glass Fibers: It consists of extremely fine glass fibers.
The classification based on the mode of propagation of light is as
follows:
● Single-Mode Fibers: These fibers are used for long-distance
transmission of signals.
● Multimode Fibers: These fibers are used for short-distance
transmission of signals.
The mode of propagation and refractive index of the core is used to
form four combination types of optic fibers as follows:
● Step index-single mode fibers
● Graded index-Single mode fibers
● Step index-Multimode fibers
● Graded index-Multimode fibers
HOW DOES THE
OPTICAL FIBRE
WORK?
● Optical fiber works on the principle of total internal
reflection. Light rays can be used to transmit a huge amount
of data, but there is a problem here – the light rays travel in
straight lines.
● So unless we have a long straight wire without any bends at
all, harnessing this advantage will be very tedious.
● Instead, the optical cables are designed such that they bend
all the light rays’ inwards (using TIR). Light rays travel
continuously, bouncing off the optical fiber walls and
transmitting end to end data.
● Although light signals do degrade over progressing
distances, depending on the purity of the material used, the
loss is much less compared to using metal cables.
A Fibre Optic Relay System consists of the
following components:
● The Transmitter – It produces the light
signals and encodes them to fit to transmit.
● The Optical Fibre – The medium for
transmitting the light pulse (signal).
● The Optical Receiver – It receives the
transmitted light pulse (signal) and decodes
them to be fit to use.
● The Optical Regenerator – Necessary for
long-distance data transmission.
ADVANTAGES OF
OPTICAL FIBRE
COMMUNICATION:
● Economical and cost-effective
● Thin and non-flammable
● Less power consumption
● Less signal degradation
● Flexible and lightweight
WHAT IS
CYBERSECURITY?
Cybersecurity is the protection of
internet-connected systems such as hardware,
software and data from cyberthreats. The
practice is used by individuals and enterprises
to protect against unauthorized access to data
centers and other computerized systems.
IMPORTANCE OF
CYBERSECURITY?
With an increasing number of users, devices and
programs in the modern enterprise, combined
with the increased deluge of data -- much of
which is sensitive or confidential -- the
importance of cybersecurity continues to grow.
The growing volume and sophistication of cyber
attackers and attack techniques compound the
problem even further.
BENEFITS OF
CYBERSECURITY:
The benefits of implementing and maintaining
cybersecurity practices include:
● Business protection against cyberattacks and
data breaches.
● Protection for data and networks.
● Prevention of unauthorized user access.
● Improved recovery time after a breach.
● Protection for end users and endpoint devices.
● Regulatory compliance.
● Business continuity.
● Improved confidence in the company's
reputation and trust for developers, partners,
customers, stakeholders and employees.
TYPES OF
THREATS:
● Malware is a form of malicious software in which any
file or program can be used to harm a computer user.
This includes worms, viruses, Trojans and spyware.
● Ransomware is another type of malware. It involves an
attacker locking the victim's computer system files --
typically through encryption -- and demanding a
payment to decrypt and unlock them.
● Social engineering is an attack that relies on human
interaction to trick users into breaking security
procedures to gain sensitive information that is
typically protected.
● Phishing is a form of social engineering where
fraudulent email or text messages that resemble those
from reputable or known sources are sent. Often
random attacks, the intent of these messages is to steal
sensitive data, such as credit card or login
TYPES OF
THREATS:
● Spear phishing is a type of phishing attack that has an
intended target user, organization or business.
● Insider threats are security breaches or losses caused by
humans -- for example, employees, contractors or customers.
Insider threats can be malicious or negligent in nature.
● Distributed denial-of-service (DDoS) attacks are those in
which multiple systems disrupt the traffic of a targeted
system, such as a server, website or other network resource.
By flooding the target with messages, connection requests or
packets, the attackers can slow the system or crash it,
preventing legitimate traffic from using it.
● Advanced persistent threats (APTs) are prolonged targeted
attacks in which an attacker infiltrates a network and remains
undetected for long periods of time with the aim to steal data.
● Man-in-the-middle (MitM) attacks are eavesdropping attacks
that involve an attacker intercepting and relaying messages
between two parties who believe
CHALLENGES OF
CYBERSECURITY:
1. Ransomware Evolution
Ransomware is a type of malware in which the data on a victim's
computer is locked, and payment is demanded before the ransomed
data is unlocked. After successful payment, access rights returned
to the victim. Ransomware is the bane of cybersecurity, data
professionals, IT, and executives.
2. Blockchain Revolution
Blockchain technology is the most important invention in
computing era. It is the first time in human history that we have a
genuinely native digital medium for peer-to-peer value exchange.
The blockchain is a technology that enables cryptocurrencies like
Bitcoin. The blockchain is a vast global platform that allows two or
more parties to do a transaction or do business without needing a
third party for establishing trust.
CHALLENGES OF
CYBERSECURITY:
3. IoT Threats
IoT stands for Internet of Things. It is a system of interrelated
physical devices which can be accessible through the internet. The
connected physical devices have a unique identifier (UID) and have the
ability to transfer data over a network without any requirements of
the human-to-human or human-to-computer interaction. The
firmware and software which is running on IoT devices make
consumer and businesses highly susceptible to cyber-attacks.
4. AI Expansion
AI short form is Artificial intelligence. According to John McCarthy,
father of Artificial Intelligence defined AI: "The science and
engineering of making intelligent machines, especially intelligent
computer programs."
5. Serverless Apps Vulnerability
Serverless architecture and apps is an application which depends on
third-party cloud infrastructure or on a back-end service such as
google cloud function, Amazon web services (AWS) lambda, etc. The
serverless apps invite the cyber attackers to spread threats on their
system easily because the users access the application locally or
off-server on their device.
THANK YOU

More Related Content

Similar to OPTICAL FIBERS.pdf

types of network_ A Comprehensive Guide.pdf
types of network_ A Comprehensive Guide.pdftypes of network_ A Comprehensive Guide.pdf
types of network_ A Comprehensive Guide.pdfAjayKumar41134
 
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...ijtsrd
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT ssk
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 

Similar to OPTICAL FIBERS.pdf (20)

types of network_ A Comprehensive Guide.pdf
types of network_ A Comprehensive Guide.pdftypes of network_ A Comprehensive Guide.pdf
types of network_ A Comprehensive Guide.pdf
 
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT
 
Ijecet 06 09_008
Ijecet 06 09_008Ijecet 06 09_008
Ijecet 06 09_008
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Transmission Media for Networking
Transmission Media for NetworkingTransmission Media for Networking
Transmission Media for Networking
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Iot Report
Iot ReportIot Report
Iot Report
 
Network security
Network securityNetwork security
Network security
 
G011123539
G011123539G011123539
G011123539
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 

Recently uploaded

Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
Low Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookLow Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookPeterJack13
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Nitin Sonavane
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxMANASINANDKISHORDEOR
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdfKamal Acharya
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfMadan Karki
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.benjamincojr
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2T.D. Shashikala
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.MdManikurRahman
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 

Recently uploaded (20)

Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Low Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s HandbookLow Altitude Air Defense (LAAD) Gunner’s Handbook
Low Altitude Air Defense (LAAD) Gunner’s Handbook
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 

OPTICAL FIBERS.pdf

  • 2. What is Optical Fiber? ● Optical fiber is the technology associated with data transmission using light pulses travelling along with a long fiber which is usually made of plastic or glass. ● Optical fibers are also unaffected by electromagnetic interference. The fiber optical cable uses the application of total internal reflection of light. ● The fibers are designed such that they facilitate the propagation of light along with the optical fiber depending on the requirement of power and distance of transmission.
  • 3. TYPES OF OPTICAL FIBRES: The types of optical fibers depend on the refractive index, materials used, and mode of propagation of light. The classification based on the refractive index is as follows: ● Step Index Fibers: It consists of a core surrounded by the cladding, which has a single uniform index of refraction. ● Graded Index Fibers: The refractive index of the optical fiber decreases as the radial distance from the fiber axis increases. The classification based on the materials used is as follows: ● Plastic Optical Fibers: The poly methyl methacrylate is used as a core material for the transmission of the light. ● Glass Fibers: It consists of extremely fine glass fibers. The classification based on the mode of propagation of light is as follows: ● Single-Mode Fibers: These fibers are used for long-distance transmission of signals. ● Multimode Fibers: These fibers are used for short-distance transmission of signals. The mode of propagation and refractive index of the core is used to form four combination types of optic fibers as follows: ● Step index-single mode fibers ● Graded index-Single mode fibers ● Step index-Multimode fibers ● Graded index-Multimode fibers
  • 4. HOW DOES THE OPTICAL FIBRE WORK? ● Optical fiber works on the principle of total internal reflection. Light rays can be used to transmit a huge amount of data, but there is a problem here – the light rays travel in straight lines. ● So unless we have a long straight wire without any bends at all, harnessing this advantage will be very tedious. ● Instead, the optical cables are designed such that they bend all the light rays’ inwards (using TIR). Light rays travel continuously, bouncing off the optical fiber walls and transmitting end to end data. ● Although light signals do degrade over progressing distances, depending on the purity of the material used, the loss is much less compared to using metal cables.
  • 5. A Fibre Optic Relay System consists of the following components: ● The Transmitter – It produces the light signals and encodes them to fit to transmit. ● The Optical Fibre – The medium for transmitting the light pulse (signal). ● The Optical Receiver – It receives the transmitted light pulse (signal) and decodes them to be fit to use. ● The Optical Regenerator – Necessary for long-distance data transmission.
  • 6. ADVANTAGES OF OPTICAL FIBRE COMMUNICATION: ● Economical and cost-effective ● Thin and non-flammable ● Less power consumption ● Less signal degradation ● Flexible and lightweight
  • 7. WHAT IS CYBERSECURITY? Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
  • 8. IMPORTANCE OF CYBERSECURITY? With an increasing number of users, devices and programs in the modern enterprise, combined with the increased deluge of data -- much of which is sensitive or confidential -- the importance of cybersecurity continues to grow. The growing volume and sophistication of cyber attackers and attack techniques compound the problem even further.
  • 9. BENEFITS OF CYBERSECURITY: The benefits of implementing and maintaining cybersecurity practices include: ● Business protection against cyberattacks and data breaches. ● Protection for data and networks. ● Prevention of unauthorized user access. ● Improved recovery time after a breach. ● Protection for end users and endpoint devices. ● Regulatory compliance. ● Business continuity. ● Improved confidence in the company's reputation and trust for developers, partners, customers, stakeholders and employees.
  • 10. TYPES OF THREATS: ● Malware is a form of malicious software in which any file or program can be used to harm a computer user. This includes worms, viruses, Trojans and spyware. ● Ransomware is another type of malware. It involves an attacker locking the victim's computer system files -- typically through encryption -- and demanding a payment to decrypt and unlock them. ● Social engineering is an attack that relies on human interaction to trick users into breaking security procedures to gain sensitive information that is typically protected. ● Phishing is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data, such as credit card or login
  • 11. TYPES OF THREATS: ● Spear phishing is a type of phishing attack that has an intended target user, organization or business. ● Insider threats are security breaches or losses caused by humans -- for example, employees, contractors or customers. Insider threats can be malicious or negligent in nature. ● Distributed denial-of-service (DDoS) attacks are those in which multiple systems disrupt the traffic of a targeted system, such as a server, website or other network resource. By flooding the target with messages, connection requests or packets, the attackers can slow the system or crash it, preventing legitimate traffic from using it. ● Advanced persistent threats (APTs) are prolonged targeted attacks in which an attacker infiltrates a network and remains undetected for long periods of time with the aim to steal data. ● Man-in-the-middle (MitM) attacks are eavesdropping attacks that involve an attacker intercepting and relaying messages between two parties who believe
  • 12. CHALLENGES OF CYBERSECURITY: 1. Ransomware Evolution Ransomware is a type of malware in which the data on a victim's computer is locked, and payment is demanded before the ransomed data is unlocked. After successful payment, access rights returned to the victim. Ransomware is the bane of cybersecurity, data professionals, IT, and executives. 2. Blockchain Revolution Blockchain technology is the most important invention in computing era. It is the first time in human history that we have a genuinely native digital medium for peer-to-peer value exchange. The blockchain is a technology that enables cryptocurrencies like Bitcoin. The blockchain is a vast global platform that allows two or more parties to do a transaction or do business without needing a third party for establishing trust.
  • 13. CHALLENGES OF CYBERSECURITY: 3. IoT Threats IoT stands for Internet of Things. It is a system of interrelated physical devices which can be accessible through the internet. The connected physical devices have a unique identifier (UID) and have the ability to transfer data over a network without any requirements of the human-to-human or human-to-computer interaction. The firmware and software which is running on IoT devices make consumer and businesses highly susceptible to cyber-attacks. 4. AI Expansion AI short form is Artificial intelligence. According to John McCarthy, father of Artificial Intelligence defined AI: "The science and engineering of making intelligent machines, especially intelligent computer programs." 5. Serverless Apps Vulnerability Serverless architecture and apps is an application which depends on third-party cloud infrastructure or on a back-end service such as google cloud function, Amazon web services (AWS) lambda, etc. The serverless apps invite the cyber attackers to spread threats on their system easily because the users access the application locally or off-server on their device.