(Solved) Assignment on Cyber Security

   

Added on  2021-06-18

10 Pages2103 Words39 Views
Running header: CYBER SECURITY1Cyber SecurityNameInstitutionDate
(Solved) Assignment on Cyber Security_1
CYBER SECURITY2Risks and Threats Very important and vulnerable targeted networks needs updates as well as support by website technology because vessels are often linked to the global websites (like Engine Maintenance system and ECDIS). Companies on the other hand, have created IT sectors to help shore based exercises as well as the supervised vessels necessities that require correspondence internet and connections (Clark and Hakim, 2017).The expanded utilization of electronic information exchange improves the probability of online-attacks in sophistication variety, and frequency (Peckham, 2012). These might result froma USB stick, which presents malware targeted to acquire delicate business data, from a certain email with definite ship data sent to obscure individuals, to the total-scale subversion of an organization's shore-based information technology framework, or the potential compromise of frameworks on board ship (Amin and Giacomoni, 2012). The quantity of potential hazard situations is huge and continues developing. Crooks utilize whichever hacking innovation is the most appropriate and frequently direct it to particular targets (Kramek, 2013).There are two categories of Cyber-attacks that can affect ships and companies are classified into two categories:1.Untargeted attacks: This is where a ship or a company’s data and systems are some of many possible targets (Fitton, Prince, Germond and Lacy, 2015). The attacks employ common based skill to locate identified susceptibilities common for various vessels or companies.
(Solved) Assignment on Cyber Security_2
CYBER SECURITY32.Targeted attacks:This is where a ship or a company’s data and systems are the planned target (Ryan, Mazzuchi, Ryan, De la Cruz, and Cooke, 2012). The attacks employ more sophisticated tools and technology specifically created to harm a particular targets (vesselor company).The VSAT (Very Small Aperture Terminal) broadband capacity allows vessels to have uninterrupted linking to the Internet, hence they are exposed to the risks of being attacked (Stone, 2013). Consequently, and due to the increase in cyber-attack cases all over the globe, thisis encouraging this business to be vigilant on this issue.After introduction of malware into a ship system or a computer linked to the web, a common activity that malware does is to create a secret command communications outward (Egloff, 2015). The outcome is possible exfiltration of information, network encryption, and several othersevere exploits. This kind of communication is potentially not recognized by ISP scanning or antivirus as a risk.Possible attackers that might execute a Cyber-attack can be a Criminal (to make profits), Activists (to disrupt operations or damage reputation), Opportunists (aiming to challenge), or Terrorists (to gain politically)Almost all Cyber-crimes have similar developing steps (Yang and Wei, 2013):oSurvey - Data gathering and creating the attacking methodoDelivery- The tools to be used for the attack are delivered in vessel’s or company’s system
(Solved) Assignment on Cyber Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Securing ship in a cyber-context
|14
|3977
|352

Challenges in Implementing Autonomous Ships
|9
|2409
|372

IoT Security: Risks and Mitigation Techniques
|10
|865
|302

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61

Mitigation Strategies for Distributed Denial of Service (DDoS) Attack
|7
|1857
|53

Machine Learning for Fraud Detection Literature Review 2022
|12
|3319
|20