Tuesday, December 31, 2019

Cyber Attacks On Maritime Targets - 1468 Words

The frequency and severity of cyber-attacks on maritime targets increases every year. Often the damage is not discovered until years later. The cyber-attack on the port of Antwerp began in 2011 and continued until it was discovered in 2013. The Danish Maritime Authority was attacked in 2012 by a virus contained in a PDF (portable document format by Adobe). The virus spread throughout the Maritime Authority’s network and into Danish government institutions before it was discovered in 2014. Reasons for the ever-increasing security exposure include the growing use and interdependence of computer systems, the relative ease and extreme value of executing attacks, and the exceptional difficulty in identifying the culprits and bringing them to justice. Regrettably, some port authorities contribute to their vulnerability by addressing cyber-security as a technology threat best left to IT professionals. On the contrary, successful and serious cyber-attacks are inevitable and the planned response must be subject to the same governance and scrutiny that any existential threat would receive. One reason that port authorities hesitate to engage cyber-threats at the Board level is a lack of appreciation for just how impossible cyber-security is. A more complete understanding of the factors that complicate cyber-security can assist Directors in stepping up to set priorities and oversee contingency and remediation plans. Cyber-risk is a relatively new issue at ports, some of whichShow MoreRelatedDomestic And International Risks Associated With Terrorism And Other Criminal Activity Threats Posed For Port Maritime Operations1715 Words   |  7 Pagesthe port FSO in assessing domestic and international risks associated with terrorism and other criminal activity threats posed to port maritime operations? There are several resources available to the port Facility Security Officer (FSO) in assessing domestic and international risks associated with terrorism and other criminal activity threats posed to port maritime operations. There are also several things to keep in mind as the FSO when trying to assess these risks. The FSO needs to build rapportRead MoreRisk Analysis : Risk Assessment1647 Words   |  7 Pagessimilar in a sense that they all aim at evaluating risk. Once risk can be determined, they can then decipher what types of strategies and decisions that should be used. Of the many risk assessments out there three distinct models who stood out were the Maritime Security Risk Analysis Model (MSRAM), The CARVER model, and lastly the Transportation Sector Security Risk Assessment (TSSRA). This paper will discuss the three risk assessment methodology’s origin, the intended audience, as well as some main elementsRead MoreSecurity Plan For Cyber Security1496 Words   |  6 P agesIn relation to defence spending, it’s visible that there was a positive increase in the year succeeding 2007, directly after the attacks. Though this was dramatically decreased for the following two years, which can be explained by the global economic downturn which begun in 2008 (Grigor†²ev Salikhov, 2009). Therefore it is not possible to conclude that Estonia directly increased spending on defence by a significant figure because of the events that took place in 2007, but it can be deduced thatRead MoreTransnational Crime Essay1890 Words   |  8 Pagesas cross-national crime, global crime, international crime, and transnational crime. In my paper, I will attempt to explain transnational crime and the types of crimes committed under this such as cybercrime, drug trafficking, money laundering, maritime piracy, theft of art and cultural objects, trade in human body parts, and human trafficking In the early twentieth century, citizens feared gangsters such as Al Capone and Baby face Nelson. In modern day society, the everyday technology mostRead MoreOur Nation s Critical Infrastructure1249 Words   |  5 Pageshas seen significant changes to the national policies that protect the population and its critical infrastructure. Two main agencies that arose from the 911 Attacks were the Department of Homeland Security (DHS) and the Department of Homeland Defense (HLD). These two agencies are responsible for protecting countless potential terrorist targets, millions of citizens, and the thousands of miles of U.S boarders. How can two government agencies protect so many assets? This paper will explore the twoRead MorePower Grid Systems ( Essp 2015 )1556 Words   |  7 Pagesforeign and domestic interruptions to the grid system are evaded (ESSP 2015). All possible threats should be looked at, inside and outside the box to have a proactive and not a reactive response. The prepl an interruption scenarios whether it be cyber-attacks, assault on a nuclear plant or a terrorist bombing at a substation to maintain a proactive response to all scenarios should be drilled into the participates as regular and methodical as a military operations (ESSP 2015). At total shutdown of theRead MoreInformation Security For The Energy Sector1549 Words   |  7 Pagesenjoying peace. After the 9/11 attacks, every citizen of the United States is always in fear of what could happen if an attack is waged. Going by the magnitude of the 9/11 attacks, any new attack would catch the country any time and from any quarters. Having this in mind, the security apparatus tasked with securing information in the energy sector should be very keen as the different critical infrastructures in the energy sector could be the next target for a terrorist attack. If a terrorist would haveRead MoreThe Underlying Motivation For Researching The Thought Provoking Construct Of Piracy1800 Words   |   8 Pagesinsights on piracy; and 4) conclusion providing reflection and insights of take-always from an interdisciplinary perspective. Research Motivation In broad daylight during a hot day in 1982, barefooted and shirtless pirates paddling wooden canoes, attack an unarmed U.S. commercial ship delivering humanitarian relief in the seaport of Freetown, Sierra Leone. The shirtless pirates are armed as they swing their grappling hooks and ropes to climb the twenty-five foot starboard hull. The pirates struggledRead MoreA Brief Note On Agro Terrorism And Its Effects On Society1799 Words   |  8 PagesAmericans have become so fixated on a 9/11 type of attack that many others modes of terrorism often go over looked, such as agricultural terrorism (agro terrorism). Agro terrorism can be defined as the intentional release of a disease substance that impacts cattle and other food supply chains that either generates widespread fear or impacts a the social economic climate (Chalk, 2004). The U.S. is vulnerable for such a disruption and cannot wait until an attack occurs before significant action is taken toRead MoreChina s Cyber Attacks Against Us Military2251 Words   |  10 PagesBrandon Pragosa Threat Assessment Dr. Urban 6 June 2015 China’s Cyber Attacks Against US Military Associated Private Firms Introduction: Based on current sources available, we have medium confidence that China will continue to conduct cyber espionage against United States defenses and military systems. It is not a new development as China’s People’s Liberation Army (PLA) cyber team has been behind many attacks against US defense firms and military systems as early as 2007. The KIQ for this

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.