Tag: cyber security

Filter By:

Filter

Cyber Security: Threats and Risks

The exchange of electronic data between ship and shore has increased significantly in the past decade. The shipping industry's use of remote monitoring of systems, diagnosis and remote maintenance will continue to increase, as will the information exchange between ships and authorities, service providers, charterers and owners/operators.

Read more

DNV GL reveals top ten cyber security vulnerabilities for the oil and gas industry

DNV GL has delivered a study to the Lysne Committee (Lysneutvalget ) that reveals the top ten most pressing cyber security vulnerabilities for companies operating offshore Norway. An international DNV GL survey of 1,100 business professionals found that, although companies are actively managing their information security, just over half (58%) have adopted an ad hoc management strategy, with only 27% setting concrete goals.

Read more

US Navy advises to know the anatomy of a cyber intrusion

How to detect, prevent and resolve cyber persistent threats US Navy says that in order to improvecybersecurity and successfully detect, prevent and resolve cyber persistent threats, you need to understand important stages of how adversaries can compromise our defenses and recommends the following measures:Stage 1 ReconDuring cyber adversary work-up periods, adversaries learn about the vulnerabilities of their target. Prior to an incident, they will gather information about the targeted networks, their systems, personnel, logistics and warfighting capabilities. They will employ many techniques, but interacting with their targets online is often the easiest method due to the volume of freely accessible information posted to popular social networking, media and web sites. Well-known, highly successful techniques to gain initial network access include:*Social Engineering and Complacency - Adversaries rely on human interaction and are often successful due to their victims violating established security policies and procedures. Their goal is to get you to relax your vigilance to the point where you feel comfortable or compelled into surrendering personal or confidential information. This information could enable them to access sensitive data without your knowledge. Cyber criminals might trick you into visiting a webpage or plugging an unauthorized device (USB memory stick, CD/DVD, hard disk ...

Read more
Page 84 of 87 1 83 84 85 87