没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
在欧盟委员会和欧盟网络安全局 ENISA 的支持下,欧盟成员国近日发布了一份报告,详细介绍了欧洲通信基础设施和网络的网络安全和弹性。 该报告概述了对欧盟具有战略意义的十种风险情景。 1、 擦除器/勒索软件攻击 2、 供应链攻击 3、 攻击托管服务、托管服务提供商和其他第三方服务商 4、 网络入侵 5、 DDOS攻击 6、 物理攻击/破坏 7、 民政国家对供应商的干预 8、 攻击运营商之间的互联 9、 影响通信网络和基础设施的停电 10、内部威胁
资源推荐
资源详情
资源评论
























Cybersecurity and resiliency of Europe’s
communications infrastructures
and networks
Follow-up to the Nevers Call of 9 March 2022
21 February 2024

2
Table of contents
1. Introduction .................................................................................................................................... 3
1.1. Policy context .......................................................................................................................... 3
1.2. Objectives and scope .............................................................................................................. 3
1.3. Methodology ........................................................................................................................... 4
1.4. Existing and upcoming frameworks and measures ................................................................ 5
2. Threats and vulnerabilities ............................................................................................................ 8
2.1. Threat actors ........................................................................................................................... 8
2.2. Threats .................................................................................................................................... 9
2.3. Vulnerabilities ....................................................................................................................... 11
2.4. Spill-over effects ................................................................................................................... 13
3. Risk scenarios ........................................................................................................................ 14
4. Recommendations ................................................................................................................ 17
4.1. Strategic recommendations .................................................................................................. 18
4.2. Technical recommendations ................................................................................................. 20
5. Conclusions and next steps .................................................................................................... 23
6. Annexes ................................................................................................................................ 25
Annex 1. Threats ............................................................................................................................... 25
Annex 2. Telecom security threat landscape .................................................................................... 25
Annex 3. Vulnerabilities .................................................................................................................... 26
Annex 4. Risk scenarios .................................................................................................................... 26
Annex 5. Recommendations ............................................................................................................ 27

3
1. Introduction
1.1. Policy context
The informal Council meeting of Telecom Ministers, which took place in Nevers on 9 March 2022,
resulted in a joint call to reinforce the EU’s cybersecurity capabilities
1
. It recognised that “critical
infrastructure such as telecommunications networks and digital services are of utmost importance to
many critical functions in our societies and are therefore a prime target for cyberattacks”. The threats
to critical infrastructure, exacerbated by Russia’s war of aggression against Ukraine, and the risk of
critical dependencies in the digital sector, in particular on high-risk suppliers, are of major concerns
for the EU. Ensuring the cybersecurity and resilience of those critical infrastructures is a main priority,
all the more in the current geopolitical landscape.
The introductory text of the joint call explains that the Ministers, “due to the current geopolitical
landscape”, want “to undertake immediate cybersecurity reinforcement actions”. The joint call covers
several points, including the resilience of communications networks, the need to strengthen the
market via public-private collaboration, the rapid adoption of the Directive on measures for a high
common level of cybersecurity across the Union (the NIS2 Directive
2
), the operationalisation of the EU
Cybersecurity Competence Centre, the further strengthening of the EU-CyCLONe and the EU cyber
crisis management network (CSIRTs Network), the need to build an ecosystem of trusted cybersecurity
service providers and the Emergency Response Fund for Cybersecurity.
Point 4 of the Nevers Call asks relevant authorities, such as the Body of European Regulators for
Electronic Communications (BEREC), the EU Agency for Cybersecurity (ENISA), and the NIS
Cooperation Group to make recommendations to EU Member States and the Commission based on a
risk assessment in order to reinforce the resilience of the EU’s communications infrastructures and
networks. This call has been reiterated in the conclusions adopted by the Council on 23 May 2022 on
the EU’s cyber posture
3
.
To follow up on this call, the NIS Cooperation Group, with the support of the Commission and ENISA
and in consultation with BEREC, conducted a high-level risk assessment on communications
infrastructures and networks. This report contains the main threats and vulnerabilities identified in
this risk assessment, develops a set of risk scenarios and makes a number of strategic and technical
recommendations.
1.2. Objectives and scope
The objective of this report is to follow-up on point 4 of the Nevers Call by assessing risks and
formulate recommendations, which, depending on Member States’ contexts, could be implemented
in the short-term, based on a high-level risk assessment, to address potential gaps in the protection
of EU’s communications networks and infrastructures. Recommendations also include areas which
require further detailed assessment.
The scope of the risk assessment, in terms of threats and scenarios, has been agreed among Member
States as follows: the risk assessment and gap analysis focus on the risks of cyber-attacks on the EU’s
1
https://presse.economie.gouv.fr/download?id=92155&pn=2131 - Joint call to reinforce the EUs cybersecurity
capabilities-pdf
2
Directive (EU) 2022/2555 of 14 December 2022 on measures for a high common level of cybersecurity across
the Union.
3
Council conclusions on the development of the European Union's cyber posture, 9364/22, 23 May 2022.

4
communications networks and infrastructures (including physical attacks on the networks and
information systems, in line with the all-hazard approach of the NIS2 Directive), by a hostile third
country, i.e. nation state actors, but also organised crime groups and hacktivists acting in support of
nation states.
In this context, the full range of cybersecurity incidents against which the operators need to protect,
is not considered, leaving out of scope, for instance, incidents caused by natural phenomena, climate
change, human errors, involuntary bugs, misfunctions and misconfigurations, cyber-attacks with a
purely financial aim, such as scams and fraud, etc.
4
These other incidents and attacks must however
still be considered by the operators when securing their systems and networks. Annex 2 contains a
longer list of threats relevant for telecom operators.
The networks and information systems assets in scope of this risk assessment are:
• Public electronic communications networks:
o Mobile networks, including the signalling networks;
o Fixed networks;
o Satellite networks;
• Core Internet infrastructure:
o Routing of Internet traffic;
o Submarine and underground cables;
o Internet exchange points (IXPs) and data centres;
o Networks and systems used for the provision of Top-level domain registries (TLDs)
and Domain Name System (DNS) services.
Out of scope are web certificates and qualified trust service providers, the (so-called over-the-top)
number-independent interpersonal communications services, as well as cloud services, unless
operators use them to deliver the above-mentioned networks or infrastructures. Also out of scope are
the end-user devices, such as smartphones, personal computers (PCs), home routers, and targeted
threats on such devices such as smartphone spyware, because they are not an integral part of the
networks or infrastructures and generally speaking not under the control of the operators. However,
scenarios where such devices are used to attack the networks and infrastructures are considered.
Regarding issues related to 5G networks, the findings of the EU Coordinated risk assessment of the
cybersecurity of 5G networks
5
published in October 2019 and the mitigating measures of the EU
Toolbox on 5G Cybersecurity (EU Toolbox)
6
of January 2020 remain valid and relevant for the purpose
of the present risk assessment.
1.3. Methodology
This report is based on the results of a risk assessment performed by Member States in the NIS
Cooperation Group, with support from the Commission and ENISA and in consultation with BEREC,
between April 2022 and December 2023. The assessment was conducted building on the methodology
of the EU Coordinated risk assessment for 5G networks and the cybersecurity analysis of Open Radio
4
ENISA, Telecom Security Incidents 2021, 27 July 2022, https://www.enisa.europa.eu/publications/telecom-
security-incidents-2021
5
NIS Cooperation Group, EU-wide coordinated risk assessment of 5G networks security, 9 October 2019,
https://digital-strategy.ec.europa.eu/en/news/eu-wide-coordinated-risk-assessment-5g-networks-security
6
NIS Cooperation Group, Cybersecurity of 5G networks - EU Toolbox of risk mitigating measures, 29 January
2020,
https://digital-strategy.ec.europa.eu/en/library/cybersecurity-5g-networks-eu-toolbox-risk-mitigating-
measures

5
Access Networks
7
. The data was gathered through a questionnaire and further discussions with
Member States within the NIS Cooperation Group. In the first stage of this process, Member States
evaluated the main threats and vulnerabilities linked to the public electronic communications
networks and the core Internet infrastructure, and the spill-over effects between these sectors and
other critical sectors. Based on these findings, Member States developed a list of risk scenarios. In a
second stage, Member States discussed and agreed on a common set of recommendations. This
report summarises the outcome of this process.
This risk assessment is complementary to the general, more technical work done by the ECASEC group
of EU telecom security authorities, who developed and maintain a framework of technical security
measures under the European Electronic Communications Code (EECC), and the work done by the NIS
Cooperation Group in the framework of the EU Toolbox. In addition, this report also provides
information to the ongoing cross-sector cyber risk evaluation requested by the Council conclusions on
the EU’s cyber posture
8
.
1.4. Existing and upcoming frameworks and measures
There are several policy frameworks and rules in place or in preparation in the EU to protect electronic
communications networks
.
1.4.1. European Electronic Communications Code (EECC)
The European Electronic Communications Code (EECC) is the main EU policy framework for the
telecom sector
9
. Adopted in 2018, these rules apply to all electronic communications services and
networks in the EU. Currently, the EECC has been transposed by most EU countries, with the
Commission supporting Member States in the implementation process. Security requirements for the
telecom sector are contained in Article 40 of the EECC (which replaces Article 13a of the Framework
Directive):
• Article 40 asks Member States to ensure that operators take “appropriate” cybersecurity
measures, and report significant incidents to the national authorities;
• Article 41 asks Member States to ensure that the national competent authority, for instance
a telecom national regulatory agency (NRA) or a cybersecurity agency, depending on the
national setting, has the powers to audit telecom operators and to enforce measures in case
of cybersecurity deficiencies.
In terms of supervision of these security requirements, Member States have taken diverse
approaches. For instance, where binding rules apply to mobile network operators, they may cover
different types of technical and organisational measures. In Member States where security measures
are further clarified in more technical and practical detail (often via secondary legislation), they often
refer to the ENISA framework of detailed technical telecom security measures
10
, which was developed
with all Member States to implement the EECC and contains a detailed list of relevant telecom security
measures.
7
NIS Cooperation, Report on the Cybersecurity of Open Radio Access Networks, 10 May 2022, https://digital-
strategy.ec.europa.eu/en/library/cybersecurity-open-radio-access-networks
8
Council conclusions on the development of the European Union's cyber posture, 9364/22, 23 May 2022.
9
Directive (EU) 2018/1972 of the European Parliament and the Council establishing the European Electronic
Communications Code.
10
ENISA Guideline on Security Measures Under the EECC, last update on 7 July 2021,
https://www.enisa.europa.eu/publications/guideline-on-security-measures-under-the-eecc
剩余27页未读,继续阅读
资源评论


lurenjia404
- 粉丝: 5942
- 资源: 190
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 基于PLC的全自动洗衣机控制系统设计:硬件与软件的完美结合方案,基于PLC的全自动洗衣机控制系统设计详解含硬件和软件设计章节一套完整方案,基于PLC全自动洗衣机控制系统设计 含Word文档一整套 前
- 基于COMSOL的结晶凝固过程仿真:考虑温度场、浓度场、相变及物质偏析的全方位分析,COMSOL仿真模拟结晶过程:涵盖温度场、浓度场、相变及物质偏析等多元因素研究,comsol 仿真结晶,凝固,考虑温
- stm32 OLED显示模块 寄存器方式代码
- 基于Matlab的迁移学习技术用于滚动轴承故障诊断,振动信号转图像处理并高精度分类,基于Matlab的迁移学习滚动轴承故障诊断系统:高准确率,简易操作,Matlab 基于迁移学习的滚动轴承故障诊断 1
- 双缸水平蒸汽机3D 双缸水平蒸汽机
- 基于XAFS数据处理的拟合算法及小波变换应用研究,基于XAFS数据处理的拟合算法及小波变换应用研究,xafs数据处理,拟合,小波变 ,xafs数据处理; 拟合; 小波变换,Xafs数据处理与拟合的小波
- 无线通信Mimo系统中STBC空时编码与MRC最大比合并的性能比较研究(基于Matlab 2016b版本),无线通信MIMO系统中的STBC空时编码与MRC最大比合并技术性能研究,基于Matlab 2
- 基于Python的Django-vue基于Spark的国漫推荐系统实现源码-说明文档-演示视频.zip
- C#实现多协议数据传输:OPC与DCS无DCOM配置读取及高效数据转发方案,C#实现无需DCOM配置的OPC与DCS数据传输:通过Socket转发至其他电脑或MODBUS/UDP协议实现高效数据读取与
- C语言基础入门学习笔记大纲.pdf
- 回溯组合问题_202503061306_54460.hinote
- 火狐判断安装_64位版本 (1).exe
- 基于python+PYQT开发的电子发票管理软件(源码+说明)
- 基于STM32F103C8T6与ATT7022芯片的三相交流电测量RTU-功能丰富、数据准确、稳定可靠的电能监控系统,基于STM32与ATT7022芯片的三相交流电测量RTU系统:集成电压、电流及多
- 回溯组合问题_202503061309_56587.pdf
- 基于python和豆包开发的根据提示词生成脚本 通过视频脚本调用微软tts生成语音功能的软件(源码)
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制
