Tag: cyber security

Filter By:

Filter

Round Table of shipping associations address major cyber security issues

Developing standards and guidelines to address the cyber security issues It has been announced that the Round Table of international shipping associations (RT) comprising BIMCO, ICS, Intercargo and INTERTANKO are developing standards and guidelines to address the major cyber security issues faced by the shipping industry.Protection against malicious attacks on computer based systems onboard ships is now hitting the top of the agenda for shipping organisations in all corners of the world. The International Maritime Organization (IMO) has already heard calls for action and the insurance industry repeatedly lists the issue as one for concern. The Round Table has made a submission to the IMO on this vital issue outlining the steps taken by the industry to address any vulnerabilities.The vulnerabilities can be numerous and the threats imminent - the question of protection is a complex set of issues and not just about operating a firewall on a ship or installing virus scanning software on the onboard computers. All of the major systems on a modern ship are controlled and monitored by software; these include the main engine, steering and navigation systems, and the ballast water and cargo handling equipment.To address this problem and help the industry to protect itself ...

Read more

DNV GL – Maritime CEO addresses cybersecurity risks

Integrated and networked solutions provide a larger target for cyber threats Ships and offshore structures are increasingly dependent on programmable control systems. These integrated and networked solutions provide an ever-larger target for cyber threats. Cybersecurity in the maritime and offshore industry was also up for discussion at this year's CMA Shipping event during a session with the US Coast Guard, ship owners and class representatives.In the past, critical network segments onboard vessels used to be kept isolated. This has changed a lot recently. "Ships and offshore structures are becoming more and more interconnected," said Tor E. Svensen, CEO DNV GL - Maritime, when taking the stage at this year's CMA (Connecticut Maritime Association) event in Stamford, CT. "In theory, all programmable components may be exposed to cyber threats, be it machinery, navigation or communication systems.""This is a weak spot," says Svensen. "There are many ways something can go wrong with the systems or software - be it caused by technical or human error, or cyber criminals." According to Svensen, cyber-attacks pose an additional risk of someone with evil intent exploiting already existing vulnerabilities. The industry has seen its first cyber events, e.g. the manipulation of AIS, ECDIS and GPS data. ...

Read more

Shipping entering the age of cyber crime

New technologies open up new opportunities for the criminals The Skuld P&I Club has issued an Advisory to inform about the increasing risk of fraud and crime in the shipping industry. New technologies have opened up new opportunities for the criminals; shipping is now entering the age of cyber crime.The challenge for ship owners is even more complex because cyber criminals are targeting diverse facets of the shipping industry. For example, there was a well-documented case of drug smugglers subverting an IT system at a major port in order to facilitate the smuggling of contraband in containers.The rise of targeted piracy and drug smuggling reflects how criminal organizationshave become more sophisticated. They will seek detailed intelligence on potentialtargets and will use modern technology to source information and data to assist intheir planning and execution of criminal ventures. Drug traffickers, drug and peoplesmugglers, pirates and fraudsters of all stripes are taking every opportunity to gaininformation that they can turn to their advantage.While shipping and logistics companies are expert at maritime transport, they maynot have the same experience with IT security. It will be essential to invest time,effort and capital into security measures to ensure these cyber risks areappropriately managed. Companies leave ...

Read more
Page 86 of 86 1 85 86