Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits. Anti-spam check. Do not fill this in!== Risks == [[IXP]] [[vulnerabilities]] can affect the [[ISP]]s that rely on them to [[exchange data]] with other [[ISP]]s. [[Threat]]s to [[IXP]]s can come externally through physical [[damage]] and [[disruption]], or internally through [[configuration]] [[errors]]. [[IXP]]s can be [[disrupt]]ed internally from within the [[Internet]]; however, they are more susceptible to external forces. Physical [[destruction]] or [[disruption]] of a major [[IXP]] would have a severe impact on the [[Internet]], resulting in [[network outage]]s and heavy [[congestion]]. Although there has never been a case of physical [[destruction]] of an [[IXP]], there are a few cases of [[disruption]] from other external causes. . . . [[External threat]]s to major [[IXP]]s, though rare, can greatly stress the [[Internet infrastructure]]. [[IXP]] owners protect their [[asset]]s by utilizing facilities with 24-hour [[security]], backup power, and various forms of shielding. . . . [M]ost [[IXP]]s are [[collocate]]d at facilities shared by [[interexchange carrier]]s ([[IEC]]) and competitive [[local exchange carrier]]s ([[CLEC]]). However, as more and more [[asset]]s are [[collocate]]d within single facilities, they become higher value [[target]]s for [[attack]] because the potential impact is greater. Summary: Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA Cancel Editing help (opens in new window) Retrieved from "https://itlaw.wikia.org/wiki/Internet_exchange_point"