Cyber Security Management: Risks, Threats, and Countermeasures Report

Verified

Added on  2021/05/27

|14
|3977
|352
Report
AI Summary
This report delves into the critical aspects of cyber security management within the shipping industry. It begins by highlighting the increasing reliance on integrated, digitized, and automated systems in modern ships, leading to heightened cyber risk. The report examines the IT environment linked to cyber shipping, emphasizing the vulnerabilities arising from interconnected networks and the potential for malicious attacks. It identifies various risks, including social engineering, malware, phishing, and scanning, along with specific threats such as denial-of-service attacks, brute-force attacks, and supply chain subversion. The report then explores possible countermeasures, emphasizing the importance of senior management risk assessment and the implementation of technical and procedural security measures. It discusses securing ships in a cyber context, focusing on technical controls like antivirus software and the need for robust security policies. The report concludes with reflections on the findings and recommendations for enhancing cyber security on ships, emphasizing the importance of data recovery, personnel training, and continuous security checks. This report aims to provide a comprehensive understanding of the cyber security challenges and solutions in the shipping sector.
Document Page
Running head: CYBER SECURITY MANAGEMENT
CYBER SECURITY MANAGEMENT
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2CYBER SECURITY MANAGEMENT
Table of Contents
Introduction................................................................................................................................3
IT environment linked to cyber shipping...................................................................................3
Cyber shipping...........................................................................................................................3
Risks.......................................................................................................................................3
Threat.....................................................................................................................................4
Possible countermeasures...........................................................................................................5
Securing ship in a cyber-context................................................................................................5
Reflection of finding..................................................................................................................6
Recommendation of securing ship.............................................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................8
Document Page
3CYBER SECURITY MANAGEMENT
Introduction
In the concept of the ships, it can be stated that in recent times ships are using the
system, which directly rely on the aspect of the integration, digitization and automation,
which directly call for the issue, which is related to the cyber management of risk on board. It
can be stated here that due to the advancement of the technology, information technology
(IT) and the operational technology (OT) the networking together of the onboard ship are
being done and more effectively connected to the to the concept of the internet. This concept
majorly gives rise to the malicious attack to the ship and authorized access to the network and
the system of the ship. Risk can also occur in the aspect of the personal access system, which
are on board for example the introduction of malware by the means of removable media. The
aspect of the different approaches, which are relating to the cyber security, can be very much
organization oriented and ship specific (Tam and Jones 2018). This approach should also be
guided by the means of appropriate guidelines of the security implications, which are put
forward by the national regulations. These types of guideline are basically provides an
approach which is risk based and directly responding to the aspect of the threats which are
related to the cyber.
The focus point of the report is to take into consideration the different aspects, which
are related to the context of the cyber security related to ships. The main emphasis in this
report is to take into consideration different aspects which are related to the maintaining the
security of the cyber system which are placed on board.
IT environment linked to cyber shipping
In the context of the cyber shipping there are different technology, which are
implemented, which would be directly responsible for the aspect of the securing of the data
and the different aspects, which are related to the working (Tam and Jones 2018).
Document Page
4CYBER SECURITY MANAGEMENT
Information technology are involved into many concepts and it can be implemented in order
to achieve different types of benefits. In the concept of the cyber, shipping it can be stated
that it has directly recolonized the technology and the aspect of the working. Be it a problem,
which is faced on the shore side or on the board of a vessel most of the shipping organization
face a vulnerable impact, which is related to the data theft, fraud, and even the concept of the
pirate attack. These type of event occur due to the factor that the key personal in the context
are careless are deliberately indulge in different types of unethical activity. According to
research, it can be stated that in West Africa as well as in South Asia it has become
increasingly clear that the technology, which is related to the cyber shipping, is not safe and
the different types of attack can be generated into the concept quite easily. Organizations
such as the ReCAAP- Regional Cooperation Agreement on Combating Privacy and Armed
Robbery against the ships in Asia has eventually started a operation which directly involved
strategy which are related to the aspect of the securing of the ships from the different types of
unethical activities or cyber-attacks (DiRenzo, Goward and Roberts 2015).
Cyber shipping
Risks
Some of the risk factors, which are related to the concept, are stated below:
Social engineering: The concept of social engineering can be considered as potential
cyber attackers to manipulate the insider individual into the concept of the breaking of
the security procedures normally but not through the aspect via social media.
Malware: the malicious software can be considered to be designed for the aspect of
accessing or directly damaging the computer system without and knowledge of the
owner. It can be stated that there are various types of malware options, which can be
included in the case, which are for example ransom ware, Trojan, worms and spyware
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5CYBER SECURITY MANAGEMENT
(Tam and Jones 2018). The process of ransomed directly encrypts the data of the user
and it is decrypted only when the ransomed amount is paid. The term, which is related
to the exploit, means the use of code or software, which are directly designed for the
aspect of taking advantage and directly manipulate a problem in another computer
system hardware or software (Kwon and Brinthaupt 2017).
Phishing: The concept of phishing mainly deals with a large number of potential
emails being send to a target machine. It can be stated here that the event may also
have a request for the user to click on a hyperlink, which would be included into the
email (Tam and Jones 2018).
Scanning can be considered as one of the most important sectors which can be related to
the concept. It can be considered as an event, which is related to an attack, which is in large
proportion in the concept of the internet (Rødseth, Perera and Mo 2016).
Threat
Denial of service attack: it directly prevents unauthorized user and legitimate user
from accessing the system or the information. The concept deals with an aspect of
flooding a network with data (Jensen 2015). A distributed denial of service (DDoS)
attack can directly take control of multiple server or computer to directly implement
and DoS attack. In these aspect the authorized person would not be able to access any
of te features which are related to the system of the ship which would be hampering
the normal working of the ship. It can hamper the normal working of the ship, which
could lead to a big problem.
Brute attack: In this type of attack, the attacker usually tries many password with the
aim of guessing the password correctly. The attacker systematically checks the entire
possible password until the correct password is found out. The main aim of the attack
is to hack the system of the user and gain the overall access to the system. This
Document Page
6CYBER SECURITY MANAGEMENT
activity is majorly done by professional who involve into the different activity of the
ship and the overall working which can be related to internal as well as external.
Subverting the chain of supply: Attacking a ship or organization by means of
compromise supporting support or software being delivered to the ship or the
company (Kwon and Brinthaupt 2017).
Spear phishing: the concept of spear phishing is very similar to the concept of
phishing but in the concept of spear phishing the individual are targeted directly with
the help of personal mail. These type of mail generally consist of software which are
malicious or consist of links which are related to the automatically download software
which are malicious.
Possible countermeasures
The outcome which is related to the senior management risk assessmnent and the
subsequesnt companies cyber strategy of security should directly in the reduction of the risk.
Taking into considertion a technical level it can be stated that this would be directly involving
the necessary action which is related to the implementation to maintain and establish an
agreed level of the security which uis related to the cyber.
The centre for security (CIS) provides a basic guideline which is related to the aspect
of the measures which are related to the guidance that can be directly be used to directly
address the cyber security vulnerability (Jensen 2015). The measures of protection comprise
iof all the lsit of critical Security control (CSC) that are directly priorized and veeted to
mainly ensure that they provide an approach which is for the companies to access and
imporve the defense. The CSCs include both the aspects which are related to procedural and
technical aspects (Tam and Jones 2018).
Document Page
7CYBER SECURITY MANAGEMENT
Securing ship in a cyber-context
Cyber security protection mechanism can be considered very much technical, which
majorly focus on the aspect of the configuration and design which is resilient to cyber-
attacks. The protection measures can be procedural and should be very much covered by the
policies of the company, security procedures, safety management procedures and control of
the access (DiRenzo, Goward and Roberts 2015).
It can be recognized that the technical cyber security aspect control can be more or
less straightforward to be implemented on a new ship than on an existing ship. The main
point of emphasis, which should be given in this context, is in the field of the implementation
of the technical control that arte very much cost effective and practical which is one the
existing ship (Kwon and Brinthaupt 2017). As a general guideline, the computers, which are
onboard, should be very well protected as a same level of protection, which is given to office
computers which are onshore. Antivirus and anti – malware software should be directly be
installed, updates and maintained on all the personal work related computers onboard. This
aspect would be directly reducing the risk of the of the system of the user which act as
vectors of the attack towards the server and other computers of the ship’s network (Rødseth,
Perera and Mo 2016). The major decision, which is related to whether to rely on these type of
defense methods and how often the system would be updated (DiRenzo, Goward and Roberts
2015).
Security of the ship can be directly be related to the safety and the precaution
measures which are taken into consideration in the aspect of the network and the cyber
security issues. The aspect of the safety should be directly involved into the working of the
different sectors, which are networked into the ship (Jensen 2015). External threats can be
considered to be very much vital in this sphere as it can involve threats, which can directly
hamper the normal functionality of the ship. External threats can be considered as intruders in
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8CYBER SECURITY MANAGEMENT
this concept, which basically take advantage of the different issue which are faced into the
system (Rødseth, Perera and Mo 2016).. People should be well adverse with the different
threats, which can be faced into the concept, which would be directly altering the different
functionality, which is related to the normal working of the ship’s network. Security checks
can be considered as a point, which should be dealt with in a proper manner so that it does
not force any type of working problem in this scenario. In most of the situation, it can be
stated that the precaution measures should be taken before the external threats can do any
type of harm into the normal working of the system (Kwon and Brinthaupt 2017).
Reflection of finding
It can be stated from the finding of the security aspect is that the support to the system
recovery and the data necessary which is related to the IT and the OT are very much
essential. To directly ensure the security, which is related to the onboard personnel, can be
judged in the sector of the navigation and the operation of the ship, which should be done in a
planned manner. The recovery plan, which can be stated that very much essential, should be
understood by person who is responsible of the cyber security of the different operation,
which are involved into the concept (DiRenzo, Goward and Roberts 2015). The level of
security, which would be involved into the concept, would be directly dependent on the
aspect of the type of ship it would be implemented upon and the type of security, which
would be involved into the concept. The aspect which is related to the data recovery and the
security of the ship can be considered as a valuable technical protection measure which
would be involving different aspect. According to me the different aspects which should be
taken care of would be in the sector the data which is stored in the ship (Jensen 2015). This is
due to the factor that most of the times it is seen that the data can be considered very much
vital in the sphere of the working of the ship and it could be very much critical when it comes
to the aspect of the security level, which would be involved, into the data. The security of the
Document Page
9CYBER SECURITY MANAGEMENT
data can be considered very much difficult if there are no backup plan involved into the data.
In some cases it can be seen that the data of the ship gets lost due to unavoidable
circumstances which can hamper the overall working which is related to the concept (Tam
and Jones 2018). It can be stated here that the communication aspect, which is involved into
the data, can also be a point of consideration in this field. If the communication aspect is lost
it can lead to a big problem in these scenario. More often back up plans always work well in
these type of situation as it is majorly seen that unwanted type of problem are faced most
often than planned or expected events (Rødseth, Perera and Mo 2016).
Recommendation of securing ship
Recommendation 1: Special type of attention should be given to the aspect of how the
control over the overall system which would be present on board. This could be for example
in a sitaution happening during layups, drydocking or when taking over a existing or new
ship. In most of the cases it is seen that the malacious software are left in the onboard system.
It should be taken into consideration that the critical should be uninstalled fro the ship and it
should be again installed when the possesion of the ship is taken.
Recommendation 2: The procedures and policies relating to the aspect of the use of
the removables devices should include a requirement to scan any of the media device which
are removable in a computer which is not connected to the ship’s network which is
controlled. It some of the cases it is seen that the scan to the removable media is not possible
on board example of laptop of a maintenance worker, then the scan to the system are done
prior to the boarding with the result and the timing which are duly documented. The
companies should considered notifying ports and the terminals about the requirement which
is related to the scaning of the removable media prior to the permiting of the files onto the
system of the ship.
Document Page
10CYBER SECURITY MANAGEMENT
Recommendation 3: The ships should have the support which is related to the
technical aspect in the event of a cyber attack. It should be taken into consisdertion that
expert person should be involved into the event so that it does not force anytype of problem
into the overall working and it has a very less impact on the overall system. in order to
protect the system there can be different types of strategy which can be incorporated into the
system which would be protecting and well as maintining the overall function of the system
(Jensen 2015).
Recommendation 4: communication plan should be one of the most important sectors
which are hampered by the hackers to directly indulge into the unethical acitivity. Most of the
time the hackers try to get the control of the ship by means of hacking the communication
channel which are used by the operation of the ship. Backup plans in this types of situation
can be very much viatal so that loss of comunication is not created by any means.
Recommendation 5: Security check policies should be implemented into the scenario
which would be directly keeping the overall system of the ship secured. Unwanted errors
should be avoided in most of the situation. In this context it should be stated that the person
who would be involved into the different activity in the ship should be given appropraite
traning which would involve all the absic activity which is related to the securing of the ship.
They should be given tranning into how to indulge into the different activity which would be
securing the shipo from different types of attack which are majorly faced within the conecpt
(Rødseth, Perera and Mo 2016).
Recommendatio 6: In most of the security check of the vistors can be very much
improtant due to the factor that they could be even involved into different types of activity
which are related to the aspect of the cyber attacks. It can be stated here that a small mistake
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11CYBER SECURITY MANAGEMENT
can hamper the overall network of the system and ventaully alter the normal working of the
aspect.
Conclusion
The report can be concluded on a note that technology can be implemented into
different forms and manner in order to gain direct advantage from the concept. In the context
of the cyber, shipping it can be stated that it has modernized the approach, which is related to
the concept. It can be stated here that there are different types of issue, which are majorly
seen in the context of any technological implementation. In the concept of the cyber shipping
there are also different types of issue, which are majorly discussed in the report, which play a
dominating role. As technology are advancing rapidly, it can be stated that in the near future,
the issue would be resolved and greater benefits can be achieved from the concept. The main
aspect, which should be taken care in the aspect of the security of the cyber shipping, is the
aspect of data; this can majorly mean the data always play a vital role in any sphere of
technology, which is included into the concept.
Document Page
12CYBER SECURITY MANAGEMENT
References
Bhandari, R., Mohanty, S.S. and Wylie, J., 2017. Cyber Security the Unknown Threat At Sea.
18-th Annual General Assembly of the International Association of Maritime Universities,
p.101.
Brasington, H. and Park, M., 2016. CYBERSECURITY AND PORTS:
VULNERABILITIES, CONSEQUENCES AND PREPARATION. Ausmarine, 38(4), p.23.
Cecil, N. and Flannery, A., 2018. Governance in practice: The top three business risks for
2018: Cyber, supply chain and regulatory compliance. Governance Directions, 70(3), p.113.
DiRenzo, J., Goward, D.A. and Roberts, F.S., 2015, July. The little-known challenge of
maritime cyber security. In Information, Intelligence, Systems and Applications (IISA), 2015
6th International Conference on (pp. 1-5). IEEE.
Egan, D., Drumhiller, N., Rose, A. and Tambe, M., 2016. Maritime Cyber Security
University Research: Phase 1 (No. CG-D-07-16). US Coast Guard New London United
States.
Egan, D., Drumhiller, N., Rose, A. and Tambe, M., 2016. Maritime Cyber Security
University Research: Phase 1 (No. CG-D-07-16). US Coast Guard New London United
States.
Falkenthal, M., Breitenbücher, U., Christ, M., Endres, C., Kempa-Liehr, A.W., Leymann, F.
and Zimmermann, M., 2016. Towards Function and Data Shipping in Manufacturing
Environments: How Cloud Technologies leverage the 4th Industrial Revolution. Proceedings
of the 10th Advanced Summer School on Service Oriented Computing, pp.16-25.
Hassani, V., Crasta, N. and Pascoal, A.M., 2017, June. Cyber Security Issues in Navigation
Systems of Marine Vessels From a Control Perspective. In ASME 2017 36th International
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]