IT environment linked to cyber shipping
Discuss about the Cyber Security Management of Ships.
In the concept of the ships, it can be stated that in recent times ships are using the system, which directly rely on the aspect of the integration, digitization and automation, which directly call for the issue, which is related to the cyber management of risk on board. It can be stated here that due to the advancement of the technology, information technology (IT) and the operational technology (OT) the networking together of the onboard ship are being done and more effectively connected to the to the concept of the internet. This concept majorly gives rise to the malicious attack to the ship and authorized access to the network and the system of the ship. Risk can also occur in the aspect of the personal access system, which are on board for example the introduction of malware by the means of removable media. The aspect of the different approaches, which are relating to the cyber security, can be very much organization oriented and ship specific (Tam and Jones 2018). This approach should also be guided by the means of appropriate guidelines of the security implications, which are put forward by the national regulations. These types of guideline are basically provides an approach which is risk based and directly responding to the aspect of the threats which are related to the cyber.
The focus point of the report is to take into consideration the different aspects, which are related to the context of the cyber security related to ships. The main emphasis in this report is to take into consideration different aspects which are related to the maintaining the security of the cyber system which are placed on board.
In the context of the cyber shipping there are different technology, which are implemented, which would be directly responsible for the aspect of the securing of the data and the different aspects, which are related to the working (Tam and Jones 2018). Information technology are involved into many concepts and it can be implemented in order to achieve different types of benefits. In the concept of the cyber, shipping it can be stated that it has directly recolonized the technology and the aspect of the working. Be it a problem, which is faced on the shore side or on the board of a vessel most of the shipping organization face a vulnerable impact, which is related to the data theft, fraud, and even the concept of the pirate attack. These type of event occur due to the factor that the key personal in the context are careless are deliberately indulge in different types of unethical activity. According to research, it can be stated that in West Africa as well as in South Asia it has become increasingly clear that the technology, which is related to the cyber shipping, is not safe and the different types of attack can be generated into the concept quite easily. Organizations such as the ReCAAP- Regional Cooperation Agreement on Combating Privacy and Armed Robbery against the ships in Asia has eventually started a operation which directly involved strategy which are related to the aspect of the securing of the ships from the different types of unethical activities or cyber-attacks (DiRenzo, Goward and Roberts 2015).
Cyber shipping: Risks
Some of the risk factors, which are related to the concept, are stated below:
- Social engineering: The concept of social engineering can be considered as potential cyber attackers to manipulate the insider individual into the concept of the breaking of the security procedures normally but not through the aspect via social media.
- Malware: the malicious software can be considered to be designed for the aspect of accessing or directly damaging the computer system without and knowledge of the owner. It can be stated that there are various types of malware options, which can be included in the case, which are for example ransom ware, Trojan, worms and spyware (Tam and Jones 2018). The process of ransomed directly encrypts the data of the user and it is decrypted only when the ransomed amount is paid. The term, which is related to the exploit, means the use of code or software, which are directly designed for the aspect of taking advantage and directly manipulate a problem in another computer system hardware or software (Kwon and Brinthaupt 2017).
- Phishing: The concept of phishing mainly deals with a large number of potential emails being send to a target machine. It can be stated here that the event may also have a request for the user to click on a hyperlink, which would be included into the email (Tam and Jones 2018).
Scanning can be considered as one of the most important sectors which can be related to the concept. It can be considered as an event, which is related to an attack, which is in large proportion in the concept of the internet (Rødseth, Perera and Mo 2016).
- Denial of service attack: it directly prevents unauthorized user and legitimate user from accessing the system or the information. The concept deals with an aspect of flooding a network with data (Jensen 2015). A distributed denial of service (DDoS) attack can directly take control of multiple server or computer to directly implement and DoS attack. In these aspect the authorized person would not be able to access any of te features which are related to the system of the ship which would be hampering the normal working of the ship. It can hamper the normal working of the ship, which could lead to a big problem.
- Brute attack: In this type of attack, the attacker usually tries many password with the aim of guessing the password correctly. The attacker systematically checks the entire possible password until the correct password is found out. The main aim of the attack is to hack the system of the user and gain the overall access to the system. This activity is majorly done by professional who involve into the different activity of the ship and the overall working which can be related to internal as well as external.
- Subverting the chain of supply: Attacking a ship or organization by means of compromise supporting support or software being delivered to the ship or the company (Kwon and Brinthaupt 2017).
- Spear phishing: the concept of spear phishing is very similar to the concept of phishing but in the concept of spear phishing the individual are targeted directly with the help of personal mail. These type of mail generally consist of software which are malicious or consist of links which are related to the automatically download software which are malicious.
The outcome which is related to the senior management risk assessmnent and the subsequesnt companies cyber strategy of security should directly in the reduction of the risk. Taking into considertion a technical level it can be stated that this would be directly involving the necessary action which is related to the implementation to maintain and establish an agreed level of the security which uis related to the cyber.
The centre for security (CIS) provides a basic guideline which is related to the aspect of the measures which are related to the guidance that can be directly be used to directly address the cyber security vulnerability (Jensen 2015). The measures of protection comprise iof all the lsit of critical Security control (CSC) that are directly priorized and veeted to mainly ensure that they provide an approach which is for the companies to access and imporve the defense. The CSCs include both the aspects which are related to procedural and technical aspects (Tam and Jones 2018).
Cyber security protection mechanism can be considered very much technical, which majorly focus on the aspect of the configuration and design which is resilient to cyber-attacks. The protection measures can be procedural and should be very much covered by the policies of the company, security procedures, safety management procedures and control of the access (DiRenzo, Goward and Roberts 2015).
It can be recognized that the technical cyber security aspect control can be more or less straightforward to be implemented on a new ship than on an existing ship. The main point of emphasis, which should be given in this context, is in the field of the implementation of the technical control that arte very much cost effective and practical which is one the existing ship (Kwon and Brinthaupt 2017). As a general guideline, the computers, which are onboard, should be very well protected as a same level of protection, which is given to office computers which are onshore. Antivirus and anti – malware software should be directly be installed, updates and maintained on all the personal work related computers onboard. This aspect would be directly reducing the risk of the of the system of the user which act as vectors of the attack towards the server and other computers of the ship’s network (Rødseth, Perera and Mo 2016). The major decision, which is related to whether to rely on these type of defense methods and how often the system would be updated (DiRenzo, Goward and Roberts 2015).
Threat
Security of the ship can be directly be related to the safety and the precaution measures which are taken into consideration in the aspect of the network and the cyber security issues. The aspect of the safety should be directly involved into the working of the different sectors, which are networked into the ship (Jensen 2015). External threats can be considered to be very much vital in this sphere as it can involve threats, which can directly hamper the normal functionality of the ship. External threats can be considered as intruders in this concept, which basically take advantage of the different issue which are faced into the system (Rødseth, Perera and Mo 2016).. People should be well adverse with the different threats, which can be faced into the concept, which would be directly altering the different functionality, which is related to the normal working of the ship’s network. Security checks can be considered as a point, which should be dealt with in a proper manner so that it does not force any type of working problem in this scenario. In most of the situation, it can be stated that the precaution measures should be taken before the external threats can do any type of harm into the normal working of the system (Kwon and Brinthaupt 2017).
It can be stated from the finding of the security aspect is that the support to the system recovery and the data necessary which is related to the IT and the OT are very much essential. To directly ensure the security, which is related to the onboard personnel, can be judged in the sector of the navigation and the operation of the ship, which should be done in a planned manner. The recovery plan, which can be stated that very much essential, should be understood by person who is responsible of the cyber security of the different operation, which are involved into the concept (DiRenzo, Goward and Roberts 2015). The level of security, which would be involved into the concept, would be directly dependent on the aspect of the type of ship it would be implemented upon and the type of security, which would be involved into the concept. The aspect which is related to the data recovery and the security of the ship can be considered as a valuable technical protection measure which would be involving different aspect. According to me the different aspects which should be taken care of would be in the sector the data which is stored in the ship (Jensen 2015). This is due to the factor that most of the times it is seen that the data can be considered very much vital in the sphere of the working of the ship and it could be very much critical when it comes to the aspect of the security level, which would be involved, into the data. The security of the data can be considered very much difficult if there are no backup plan involved into the data. In some cases it can be seen that the data of the ship gets lost due to unavoidable circumstances which can hamper the overall working which is related to the concept (Tam and Jones 2018). It can be stated here that the communication aspect, which is involved into the data, can also be a point of consideration in this field. If the communication aspect is lost it can lead to a big problem in these scenario. More often back up plans always work well in these type of situation as it is majorly seen that unwanted type of problem are faced most often than planned or expected events (Rødseth, Perera and Mo 2016).
Possible countermeasures
Recommendation 1: Special type of attention should be given to the aspect of how the control over the overall system which would be present on board. This could be for example in a sitaution happening during layups, drydocking or when taking over a existing or new ship. In most of the cases it is seen that the malacious software are left in the onboard system. It should be taken into consideration that the critical should be uninstalled fro the ship and it should be again installed when the possesion of the ship is taken.
Recommendation 2: The procedures and policies relating to the aspect of the use of the removables devices should include a requirement to scan any of the media device which are removable in a computer which is not connected to the ship’s network which is controlled. It some of the cases it is seen that the scan to the removable media is not possible on board example of laptop of a maintenance worker, then the scan to the system are done prior to the boarding with the result and the timing which are duly documented. The companies should considered notifying ports and the terminals about the requirement which is related to the scaning of the removable media prior to the permiting of the files onto the system of the ship.
Recommendation 3: The ships should have the support which is related to the technical aspect in the event of a cyber attack. It should be taken into consisdertion that expert person should be involved into the event so that it does not force anytype of problem into the overall working and it has a very less impact on the overall system. in order to protect the system there can be different types of strategy which can be incorporated into the system which would be protecting and well as maintining the overall function of the system (Jensen 2015).
Recommendation 4: communication plan should be one of the most important sectors which are hampered by the hackers to directly indulge into the unethical acitivity. Most of the time the hackers try to get the control of the ship by means of hacking the communication channel which are used by the operation of the ship. Backup plans in this types of situation can be very much viatal so that loss of comunication is not created by any means.
Recommendation 5: Security check policies should be implemented into the scenario which would be directly keeping the overall system of the ship secured. Unwanted errors should be avoided in most of the situation. In this context it should be stated that the person who would be involved into the different activity in the ship should be given appropraite traning which would involve all the absic activity which is related to the securing of the ship. They should be given tranning into how to indulge into the different activity which would be securing the shipo from different types of attack which are majorly faced within the conecpt (Rødseth, Perera and Mo 2016).
Securing ship in a cyber-context
Recommendatio 6: In most of the security check of the vistors can be very much improtant due to the factor that they could be even involved into different types of activity which are related to the aspect of the cyber attacks. It can be stated here that a small mistake can hamper the overall network of the system and ventaully alter the normal working of the aspect.
Conclusion
The report can be concluded on a note that technology can be implemented into different forms and manner in order to gain direct advantage from the concept. In the context of the cyber, shipping it can be stated that it has modernized the approach, which is related to the concept. It can be stated here that there are different types of issue, which are majorly seen in the context of any technological implementation. In the concept of the cyber shipping there are also different types of issue, which are majorly discussed in the report, which play a dominating role. As technology are advancing rapidly, it can be stated that in the near future, the issue would be resolved and greater benefits can be achieved from the concept. The main aspect, which should be taken care in the aspect of the security of the cyber shipping, is the aspect of data; this can majorly mean the data always play a vital role in any sphere of technology, which is included into the concept.
References
Bhandari, R., Mohanty, S.S. and Wylie, J., 2017. Cyber Security the Unknown Threat At Sea. 18-th Annual General Assembly of the International Association of Maritime Universities, p.101.
Brasington, H. and Park, M., 2016. CYBERSECURITY AND PORTS: VULNERABILITIES, CONSEQUENCES AND PREPARATION. Ausmarine, 38(4), p.23.
Cecil, N. and Flannery, A., 2018. Governance in practice: The top three business risks for 2018: Cyber, supply chain and regulatory compliance. Governance Directions, 70(3), p.113.
DiRenzo, J., Goward, D.A. and Roberts, F.S., 2015, July. The little-known challenge of maritime cyber security. In Information, Intelligence, Systems and Applications (IISA), 2015 6th International Conference on (pp. 1-5). IEEE.
Egan, D., Drumhiller, N., Rose, A. and Tambe, M., 2016. Maritime Cyber Security University Research: Phase 1 (No. CG-D-07-16). US Coast Guard New London United States.
Egan, D., Drumhiller, N., Rose, A. and Tambe, M., 2016. Maritime Cyber Security University Research: Phase 1 (No. CG-D-07-16). US Coast Guard New London United States.
Falkenthal, M., Breitenbücher, U., Christ, M., Endres, C., Kempa-Liehr, A.W., Leymann, F. and Zimmermann, M., 2016. Towards Function and Data Shipping in Manufacturing Environments: How Cloud Technologies leverage the 4th Industrial Revolution. Proceedings of the 10th Advanced Summer School on Service Oriented Computing, pp.16-25.
Hassani, V., Crasta, N. and Pascoal, A.M., 2017, June. Cyber Security Issues in Navigation Systems of Marine Vessels From a Control Perspective. In ASME 2017 36th International Conference on Ocean, Offshore and Arctic Engineering (pp. V07BT06A029-V07BT06A029). American Society of Mechanical Engineers.
Heymann, E., Miller, B.P., Alghazzawi, M.J. and Incertis, D., 2016. Addressing the Cyber-Security of Maritime Shipping. In European Transport Conference 2016Association for European Transport (AET).
Heymann, E., Miller, B.P., Alghazzawi, M.J. and Incertis, D., 2016. Addressing the Cyber-Security of Maritime Shipping. In European Transport Conference 2016Association for European Transport (AET).
Jensen, L., 2015. Challenges in Maritime Cyber-Resilience. Technology Innovation Management Review, 5(4), p.35.
Kwon, J.H. and Brinthaupt, T.M., 2017. Beyond Black Friday: The Value of Collaborative Research on Seasonal Shopping Events and Behavior. World Academy of Science, Engineering and Technology, International Journal of Fashion and Textile Engineering, 4(12).
Lee, Y.C., Park, S.K., Lee, W.K. and Kang, J., 2017. Improving cyber security awareness in maritime transport: A way forward. ????????????, 41(8), pp.738-745.
Levander, O. and Innovation, V.P., 2016, January. Ship intelligence–a new era in shipping. In The Royal Institution of Naval architects, Smart Ship Technology, Internation-al Conference proceedings (pp. 26-27).
McDonald, C., 2018. The Rising Tide of Maritime Shipping Risks. Risk Management, 65(2), pp.4-7.
Melito, T., 2017, October. International Food Assistance: Cargo Preference Increased Food Aid Shipping Costs; Benefits Remain Unclear, Statement of Thomas Melito, Director, International Affairs and Trade, Testimony Before the Committee on Foreign Relations, US Senate. In United States. Government Accountability Office (No. GAO-18-193T). United States. Government Accountability Office.
Rødseth, Ø.J., Perera, L.P. and Mo, B., 2016. Big data in shipping-Challenges and opportunities.
Rødseth, Ø.J., Perera, L.P. and Mo, B., 2016. Big data in shipping-Challenges and opportunities.
Tam, K. and Jones, K., 2018. Cyber-Risk Assessment for Autonomous Ships.
Van Niekerk, B., 2017. Analysis of cyber-attacks against the transportation sector. Threat mitigation and detection of cyber warfare and terrorism activities, pp.69-92.