logo

Cyber Security Management : Doc

18 Pages3911 Words54 Views
   

Added on  2021-06-15

Cyber Security Management : Doc

   Added on 2021-06-15

ShareRelated Documents
Running head: CYBER SECURITY MANAGEMENTCyber Security managementName of the StudentName of the UniversityAuthor’s Note
Cyber Security Management : Doc_1
2CYBER SECURITY MANAGEMENT Table of ContentsIntroduction......................................................................................................................................3Description of IT environment........................................................................................................3NIST framework..........................................................................................................................4Cyber Security Management...........................................................................................................4Network Security issues..................................................................................................................7Network Security Model................................................................................................................10Conclusion.....................................................................................................................................14Recommendations..........................................................................................................................14References......................................................................................................................................16
Cyber Security Management : Doc_2
3CYBER SECURITY MANAGEMENT IntroductionCyber security has been an important for the application of information technology invarious fields. Different cyber rusks and threats are prevailing in the marmite with theimplementation of information technology. In the shipping industry, information technology hasplayed an important role in providing a quality transportation services. Modern technology havehelped in creating digitalized ships and increase in the exchange of data and information.However, this have increased in cyber-attacks and variety of threats in the internet. The CyprusShipping Chamber has been facing various IT security risks and threats due to theimplementation of the digitalization and information technology. This report has focused on thecyber security issues in the shipping industry. This report outlines about the different strategyfor mitigating these issues related to the cyber issues in the shipping industry. Description of IT environmentIn the modern world, ships have been integrated with information technology and relyingin integration, digitalization and automation. These advancement in the shipping industry havebeen helping in providing a keen approach towards the benefits and quality transportationthrough water. However, this integration system has been increasing the accessibility of the shipsfor transportation (Bonaci et al. 2015). The safety, environmental and commercial consequencesof the cyber security issues have been significantly affecting the shipping industry. The responseto increasing cyber threat have been supported with various group of stakeholders in thecompanies. The stakeholders are responsible for maintaining the cyber threats included inshipping industry. The use of various information technology at different parts of the ship havebeen helping in different ways for providing a better (Bush et al. 2015). This case study has been
Cyber Security Management : Doc_3
4CYBER SECURITY MANAGEMENT showing a real scenario of the implementation of information technology at various parts of theshipping industry. With the implementation of the I technology in the shipping industry. Thecyber threats have been creating several issues in the shipping industry. Risks involved in theshipping us dustsr have been identified in order to mitigate issues in the shipping industry. The International Maritime Organization (IMO) has able to develop some policies inorder to provide strategies for the development of recommendation to mitigate maritime cyberrisks. The risks management to procedure in the maritime industry have been initiated by thisorganization that have helped a lot to reduce cyber threats in the industry (Thakur et Al. 2015).Cyber security has been a major threat to the shipping industry. The information technologyhave helped in storing data and information of the persons on the shop and others staffs.Therefore, this data an information is important for the shipping company as the ship will be inthe middle of the sea. The security of the ship and staffs on the ship have been dependent of thedata and information. The use of the information technology have helped in storing data andinformation over the cloud and online database. Therefore, it creates a huge risks for the cyberthreats and risks in shipping industry. NIST frameworkThe National Institute of Standards and Technology framework has been helping indeveloping guidelines for providing security to data and information. The NIST focuses in theunderstanding, managing and expressing cyber security of data and information both externallyand internally (Glantz et al. 2014). The stakeholders of the organization have been responsiblefor the security of the data and information in the market. The use of the NIST help in providingactions in reducing cyber security risks. Therefore, it helps in aligning policy and technologicalapproaches.
Cyber Security Management : Doc_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Maritime Industries
|15
|4207
|35

Security Threats in Maritime Industry and West Africa: Risks, Impacts, and Recommendations
|12
|3176
|136

Environmental Risks in Maritime Logistics
|9
|1982
|476

Investigate environmental risks in maritime logistics with focus on Australian cases
|25
|4942
|464

Cyber-Security in Shipping Industry: Ransomware and Malware
|9
|1431
|233

Risks and Issues with Data Security and Cybercrime in Australia- Case Study
|16
|3636
|249