MARITIME CYBER SECURITY Archives - Page 10 of 40 - SHIP IP LTD

As more of our lives move online, experts are warning people and businesses to be extra careful about data breaches, particularly as there is an uptick in cyber attacks with more people working from home.

October is Cyber Security Awareness Month.

“We’re seeing different types of cyber attacks, especially with work from home initiatives,” said Tillman Hodgson, president of the Kelowna-based data security firm SeekingFire Consulting.

“Even businesses that had robust security frameworks in place maybe didn’t take into account most of the workforce being at home,” he said.

Hodgson recommends keeping devices updated with the latest security patches and using unique accounts and passwords.

soruce:globalnews


As much of our lives go online, experts warn people and businesses to pay particular attention to data breaches. In particular, the number of cyber attacks that increase the number of people working at home is increasing.

October is Cyber ​​Security Awareness Month.

Tillman Hodgson, president of Kelowna-based data security company Seeking Fire Consulting, said:

read more:

Canadian Center for Cyber ​​Security warns infrastructure at risk of cyberattacks

“Even companies that have implemented robust security frameworks may not have taken into account most of their home-based employees,” he said.

Hodgson recommends keeping your device up-to-date with the latest security patches and using unique accounts and passwords.

The story continues under the ad

read more:

Canada’s cybersecurity needs to work, even though it’s at the top: Experts

According to a recent BC Chamber of Commerce survey, more than 60% of companies have experienced cyber breaches, but only three-quarters have reported them.

“When we think of cyber breaches, the typical impact we see is the impact on business productions that have been knocked out for some time,” he said.

New Maritime Cyber ​​Security Center to Fight Pirates in the High Seas and Digital World

“But there is also an impact on reputation, so there is an incentive to do things internally,” Hodgson said. “But in the long run, it really affects everyone.”

Hodgson suggested that businesses should spend about 4% of their revenue on security and privacy initiatives.

He said companies need to scrutinize how employees share data and make sure the data is safe.

 

Soruce:eminetracanada


Establishing public-private partnerships to support information sharing in defense of critical infrastructure and homeland security has been a challenge for over 20 years. We have enacted policy, created incentives, attempted to build bridges, and more to bring government and industry together to close the gaps in our national defense strategy. However, as recent attacks against our critical infrastructure have shown, we have not been successful.

Attempts to overcome public-private information silos have been reinvigorated by CISA’s establishment of the Joint Cyber Defense Collaborative (JCDC). The newly formed collaborative represents an unprecedented — and, as yet, untested — partnership between a variety of government agencies (including the Department of Homeland Security, Department of Defense, U.S. Cyber Command, and others) and private-sector partners (including Microsoft, Google, and Amazon). The JCDC has been tasked with “coordinating cyber defense capabilities to ensure a whole-of-nation approach to securing critical infrastructure and defending national interests,”[1] aligning both commercial and government interests and marshaling the respective resources of both to defend against increasingly sophisticated cyber attacks against critical infrastructure.

The JCDC is a promising step toward building an effective coalition, but it is a futile exercise if it builds partnerships according to the same information sharing model that previously failed to deliver the kind of public-private collaboration needed to effectively anticipate and respond to attacks against critical infrastructure.

Consider the current hub-and-spoke model of information sharing. In this model, information is passed from discrete organizations (spokes) to a central hub, which analyzes, enriches, and anonymizes data as needed before sharing that data with other spokes. There are benefits to this model, but it also has significant limitations. First, it imposes a one-size-fits-all information sharing protocol on sharing communities with unique needs, resulting in uneven participation. It also slows down incident response time, as information must first pass through the hub before being shared outward with other spokes.

Most importantly, private sector entities have been hesitant of the federal government asking for — or in some instances, demanding — their data. Private sector entities are often unwilling to share information about vulnerabilities or cyber incidents because they don’t have confidence that their information will be properly protected. Should such data be breached, companies run the risk of negative publicity, compromised reputation, regulatory penalties, the loss of trade secrets, and — consequently — falling stock prices and lost revenue.[2] In short, the private sector has many reasons to see information sharing with the federal government as counter to its best interests.

Historically, the government has resisted mandating threat-information sharing between public and private sectors, attempting instead to alleviate the private sector’s concerns and incentivize the voluntary sharing of information.[3] However, legislation currently being advanced on Capitol Hill requires the private sector to swiftly report hacks to CISA, with noncompliant companies facing subpoena or even potential penalties if they fail to do so within the mandatory reporting timeframe. In forcing companies to “report hacks or else,” CISA would compromise the public-private information-sharing partnerships currently being cultivated through the JCDC, leaving us right back where we started.

Director Jen Easterly has been clear that CISA is not and should not become a regulatory or enforcement agency and that its goal is to act as a trusted partner.[4] However, even if it does not compel information sharing, in establishing itself as a central hub and prioritizing receiving threat information from the public sector, CISA runs the risk of developing asymmetrical partnerships plagued with all the old challenges.

Instead, CISA should work to establish partnerships according to a point-to-point distributed model in which information is shared freely among both private and public stakeholders in the national cyber defense mission. In the point-to-point distributed model, no single organization controls the inflow and outflow of threat information, and vertical partnerships between public sector entities and CISA are deprioritized in favor of horizontal partnerships among critical infrastructure owners and operators, government agencies (including CISA), and other cybersecurity partners. As a result, information can be shared at an operational tempo and according to an individual community’s specific needs rather than the needs of the hub.

The point-to-point distributed model more closely reflects how communities already work together — independently of the federal government — to protect their own infrastructure and resources. As such, supporting a point-to-point model is a more efficient use of both regional and federal resources than compelling communities to adopt new sharing practices and standards. In fact, many of CISA’s current resource investments already support a point-to-point distributed model.

Specifically, in recent months the agency has focused on recruiting industry leaders into cybersecurity advisor positions tasked with bringing together regional critical infrastructure owner/operators with federal, state, local, and other stakeholders. CISA has wisely focused on recruiting advisors who are already embedded within their assigned region and who, as a result, already have longstanding community ties. Unsurprisingly, many of these advisors are former National Guardsmen, who have been engaging and defending their communities from cyber attack while simultaneously working within the private sector. As such, the National Guard serves as an excellent example of the kind of community collaboration that already exists and that can be resourced by CISA via a point-to-point distributed model.

That said, the most immediate and useful resource CISA has to offer is the wealth of unclassified information that it currently owns. Offering this information to its private-sector partners without compelling information sharing in return would better enable CISA’s regional cybersecurity advisors to build stakeholder relationships on a foundation of trust rather than policy. It would also position CISA as a participant within a broader community of sharing communities rather than as a regulator of a governmental information sharing process. In short, the hub-and-spoke model may empower CISA, but a new distributed model can better empower the national defense effort as a whole.

As a country, we have an incredible number of resources and partnerships at our disposal, and this puts us at a significant advantage in the cyber fight. However, if we want to outpace increasingly sophisticated cyber warfare, we are going to need to observe globally, protect nationally, and defend locally.

 

Soruce:hstoday


As of the 25th of October, one incident has been reported 86nm SW Agbami Terminal with one vessel understood to have been boarded. In addition, MDAT GOG have issued an alert for an increased risk of piracy in a region offshore from São Tomé and Príncipe. It is recommended that all vessels transiting the area exercise extreme caution and increase security procedures.

 

Access the latest Triton Scout Maritime Security Threat Assessment for the week commencing Monday 25th October.

In Nigeria, the Bayelsa state government imposed a dusk-dawn curfew on waterways in order to curtail sea piracy, kidnapping and other criminal activities. This is an addition to the ban on the use of 200 horsepower speed boats typically used in riverine and maritime crime. In addition, this week Nigerian officials claimed the new leader of the Islamic state in West African Province was “taken out” by troops earlier this week.

Access the full analysis via the Dryad Global Triton Scout Maritime Security Threat Assessment interactive infographic brings the macro and the micro of global risk intelligence together in one accessible, intuitive space.
soruce:channel16

This article is the third in a series that the Coast Guard will be publishing in recognition of Cybersecurity Awareness Month. Now in its 18th year, Cybersecurity Awareness Month emphasizes the importance of cybersecurity and cyber risk management across all critical infrastructure, especially the Marine Transportation System (MTS).

Cybersecurity incidents are becoming an increasingly frequent occurrence and can have significant impacts, as evidenced by the recent Solar Winds incident and the attack on Colonial Pipeline.

The maritime community is not immune from cybersecurity incidents with several events resulting in reduced operations and financial losses for maritime businesses. Cyber hygiene is the first line of defense in a cyber risk management plan and involves the processes one uses to protect access to an information network.

The first step for good cyber hygiene is password management. This includes:

  • changing a password frequently
  • ensuring that the password is complex
  • and limiting users who have administrative level access

Recent Coast Guard inspections revealed cybersecurity risks from poor cyber hygiene. Examples include:

  • passwords semi-permanently attached to the equipment they are used on
  • printed emails noting that a password has changed lying in plain view
  • and sharing user accounts to display electronic vessel certificates or reference Safety Management System documents

soruce:workboat


Danish bridge simulator specialist Force Technology has launched SimFlex Cloud, a dedicated software-as-a-service (Saas) solution offering highly realistic navigation training.

SimFlex Cloud provides global onshore and onboard access to Force Technology’s SimFlex simulator and simulator engine and model library. SimFlex offers user-friendly access to next generation mixed reality simulation, using both Virtual Reality (VR) and Augmented Reality (AR) headsets to maximise realism and immersion.

Force Technology customers can configure training with SimFlex Cloud however best suits their organisational structure and training needs. The system optimises maritime cloud simulator training with qualified instructors from Force Technology or the customer’s own network in control of all learning aspects, communication, exercise creation and delivery, debriefing and evaluation for live participants located anywhere in the world.

SimFlex Cloud can also be used as a self-study tool, giving junior officers, experienced captains and senior officers the ability to practice their skills whenever and wherever they can, using a laptop or desktop PC and monitor set up, as well the optional VR or AR headsets for even greater realism.

For ship managers and shipping companies, SimFlex Cloud provides a means to reduce and optimise training budgets while increasing the quality of the technical training available to staff. Flexible and scalable licencing options ensure that customers only pay for exactly what they use, while providing the ability to reduce or increase investment based on current requirements. Further, the connected nature of SimFlex Cloud ensures that users will always have the most recent content and training methods available.

source : https://thedigitalship.com/news/electronics-navigation/item/7557-force-technology-unveils-cloud-based-navigation-training


Pakistan’s Ministry of Maritime Affairs at the annual joint meeting of the China Pakistan Economic Corridor (CPEC), on September 26th, announced major investment plans by the Chinese government for the development of the Karachi Coastal Comprehensive Development Zone, or KCCDZ. The project aims to develop a modern port city in coordination with the Karachi Port Trust.

Unlike previous deals under the CPEC which included monetary loans for development projects, the new agreement involves direct equity investment worth $3.5 billion. The KCCDZ plans to establish various infrastructure facilities on 1500 acres of underutilized land owned by the Karachi Port Trust, to support residential, commercial, and seaport activities.

 

SOURCE READ THE FULL ARTICLE

https://www.fleetmon.com/maritime-news/2021/35685/china-plans-35-billion-investment-pakistans-karach/


US Coast Guard will be examining the Hapag Lloyd vessel ROTTERDAM EXPRESS in relation to the pipeline that was severed off near the coast of Southern California. It is being speculated that a ship’s anchor might have damaged the pipeline that led to 3,000 barrels of crude flowing into the sea near Huntington Beach, south of Los Angeles on Sunday.

The speculations are fueled by the US Coast Guard’s initial investigation which revealed that a section of the pipeline was laterally displaced from its place by more than 30m. Hapag-Lloyd owned vessel, ROTTERDAM EXPRESS had anchored approximately 500m away from the pipeline when the oil spill was first detected, and later the vessel left for Oakland.

A Hapag-Lloyd spokesperson explained that as per the direction of San Pedro Traffic, ROTTERDAM EXPRESS had anchored at SF-3 anchorage on 21 September 2021. The vessel had dropped at the exact directed location and the same was confirmed by San Pedro Traffic.

 

SOURCE READ THE FULL ARTICLE

https://www.fleetmon.com/maritime-news/2021/35689/california-pipeline-oil-spill-case-hapag-lloyd-ves/


Israeli shipping company ZIM Integrated Shipping Services has established a new subsidiary, Ship4wd, a digital freight platform offering online solution services similar to Airbnb and Uber.

The new service will cover all aspects of the complex international shipping process, enabling customers without previous experience in cross-border shipping to manage their import and export business.

The Ship4wd platform will also allow users to choose either the most economic or the fastest shipping option, with both sea and air shipping services up to the final destination, including land & rail transport, and associated logistic services.

“Similar to the way other groundbreaking platforms such as Airbnb in tourism and Uber in transportation have transformed their industries, we are aiming to enable everyone to be a self-shipper, by simplifying and streamlining the transfer of goods worldwide down to its essence – a ‘few clicks’ shipping solution,” Assaf Tiran, ZIM VP Global Customer Service also heading Digital Innovation, added.

SOURCE READ THE FULL ARTICLE

ZIM: Like Airbnb and Uber, everyone can be a self-shipper in shipping


Korean shipyard Samsung Heavy Industries (SHI) has ordered the tank design for four new LNG carriers from the French LNG containment specialist GTT.

Samsung Heavy orders GTT tank design for 4 new LNGCs
Illustration only; Courtesy of Samsung Heavy Industries

SHI needs these designs of the new LNG carriers that will go to an undisclosed Asian ship-owner.

SOURCE READ THE FULL ARTICLE

Samsung Heavy orders GTT tank design for 4 new LNGCs


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED