MARITIME CYBER SECURITY Archives - Page 33 of 40 - SHIP IP LTD

ABSG Consulting Inc. (ABS Consulting), a subsidiary of ABS focused on safety and risk management, and American Steamship Owners Mutual Protection and Indemnity Association, Inc. (the American Club) have joined forces to provide education, training and insurance guidance that address maritime cyber security.

As digital transformation in the maritime industry brings both opportunities and new challenges, owners and operators are relying more on smart technologies and operational data to drive decisions and run their businesses. Comprehensive cyber security programs are not only necessary to protect operations but are also critical to protect the overall safety of crew and the environment. More frequent cyber attacks, increased digitalization and emerging global regulatory focus are adding to immediate demands to address and reduce cyber risk across the industry’s value chain. Cyber security has become a business imperative and new measures will have an impact on how maritime vessels and facilities will be covered by insurers.

Dr. William Moore, Director of Loss and Prevention at the American P&I Club, says:

“The safety and security of our members is a priority. Having a better understanding of the tools available, the programs that can be implemented and the integration of these in the marine industry will help us provide better services to shipowners and charterers globally. The work we are going to do with ABS Consulting is going to help us identify how to enhance our policies, and the offerings we need to incorporate to improve the coverage and services we offer to our members.”

Ian Bramson, Global Head of Cyber Security of ABS Group, says:

“Collaborating with the American Club to build education programs for their members and industry will give us a better understanding of the real challenges we are collectively facing. This alliance enables us to develop the tools, training and services that support compliance and help ship owners and operators put protections in place to secure their vessels – from the design and construction phases through continuous operation over their service life.”

Source: seawanderer


ABS Consulting and American P&I Club have joined forces to provide education, training and insurance guidance to address maritime cyber security.

A teaming with the consulting subsidiary of classification society ABS will help American Club “identify how to enhance our policies, and the offerings we need to incorporate to improve the coverage and services we offer to our members,” said Dr William Moore, director of the club’s Loss Prevention.

“Collaborating with the American Club to build education programs for their members and industry will give us a better understanding of the real challenges we are collectively facing,” commented Ian Bramson, global head of Cyber Security at ABS Group.

“This alliance enables us to develop the tools, training and services that support compliance and help ship owners and operators put protections in place to secure their vessels – from the design and construction phases through continuous operation over their service life,” he added.

Source: seatrade-maritime


ClassNK has joined the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC). Set up in February this year, MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training and collaboration efforts between private and public sector stakeholders.

ClassNK is the first classification society and the first non-U.S. organization to formally join MTS-ISAC, helping broaden the reach of MTS-ISAC’s efforts to support the maritime community.

The partnership provides ClassNK with actionable insights from community-sourced cyber threat intelligence to reinforce ClassNK’s Cyber Security Guidelines to help prevent cyber incidents from negatively impacting the safety and security of maritime operations.

Both vessel and shoreside cybersecurity efforts will be under increasing scrutiny starting in 2021. IMO has set a January 21, 2021, deadline for Maritime Cyber Risk Management to be addressed in ships’ Safety Management Systems. Meanwhile, the U.S. Coast Guard will be inspecting Maritime Transportation Security Act of 2002 regulated facilities for cyber risk management efforts for the first time starting with annual inspections occurring on or after October 1, 2021.

“We have been working with the International Association of Classification Societies (IACS), maritime stakeholders and cyber security professionals to understand and promote cybersecurity best practices across the maritime transportation system (MTS),” says Hirofumi Takano, Executive Vice President at ClassNK. “By joining the MTS-ISAC, we will have increased visibility to current, real-world examples of cyber threats targeting MTS stakeholders. This provides us an opportunity to reinforce how, and periodically update, ClassNK’s Cyber Security standards to provide our stakeholders with the latest security recommendations to protect their assets from cyber threats. With IMO 2021 right around the corner, this relationship is perfectly timed to add increasing value to our stakeholders, and we are excited to be a part of the active and growing MTS-ISAC community. We hope ClassNK stakeholders will quickly understand the value of this partnership.”

“We are excited that ClassNK is bringing a proactive, classification society perspective into the MTS-ISAC community,” says Scott Dickerson, MTS-ISAC’s Executive Director. “The MTS community’s resiliency is improved when we can quickly address cyber risks with meaningful cybersecurity controls. ClassNK joining the MTS-ISAC is a perfect example of how community partnerships provide win-win situations while reinforcing to stakeholders how the implementation of guidelines and recommended security controls can reduce their exposure to risks the community is actively seeing.”

Source: marinelog


Growing marine industry digitalization brings with it increasing exposure to cyber risk. In response, ABS Consulting, an ABS Group subsidiary focused on safety and risk management, has joined forces with the American P&I Club to provide education, training and insurance guidance on maritime cybersecurity.

More frequent cyber attacks, increased digitalization and emerging global regulatory focus are adding to immediate demands to address and reduce cyber risk across the industry’s value chain. Cybersecurity has become a business imperative and new measures will have an impact on how maritime vessels and facilities will be covered by insurers.

“The safety and security of our members is a priority. Having a better understanding of the tools available, the programs that can be implemented and the integration of these in the marine industry will help us provide better services to shipowners and charterers globally,” says Dr. William Moore, Global Loss Prevention Director at the American Club. “The work we are going to do with ABS Consulting is going to help us identify how to enhance our policies, and the offerings we need to incorporate to improve the coverage and services we offer to our members.”

“Collaborating with the American Club to build education programs for their members and industry will give us a better understanding of the real challenges we are collectively facing,” says Ian Bramson, Global Head of Cyber Security of ABS Group. “This alliance enables us to develop the tools, training and services that support compliance and help ship owners and operators put protections in place to secure their vessels – from the design and construction phases through continuous operation over their service life.”

Source: marinelog


A new interactive infographic summarises the key considerations owners and operators should make when building a cyber security plan.

The Shipowners’ Club infographic is based on the IMO’s recommendation of a cyber security risk management framework based in five functional elements: Identify, Protect, Detect, Respond and Recover.

‘Identify’ – which systems are vulnerable to attacks, which systems are vital to operations and who is responsible for them.

‘Protect’ – the plan should define measures to prevent attacks from taking place.

‘Detect’ – if an attack does happen, recognising it can mitigate damage

Respond – plan a clear means of getting back up and running as quickly as possible using a second system.

Recover – get the primary system back running and analyse the cause.

Neptune Cyber tool

Neptune Cyber has also launched a new online tool to ensure marine operators stay ahead of new cyber risk regulations that come into force in January 2021.

The ‘MV Neptune Cyber’ ship allows visitors to go on a virtual exploration of a vessel and understand potential cyber risks.

In June 2017, the IMO laid out its ‘Guidelines on Maritime Cyber Risk Management’. Shipowners and managers now have until 1 January 2021 to build cyber risk management into their ship safety initiatives – or risk having their ships detained.

Gwilym Lewis, CEO of Neptune Cyber, said: “Our quick-start guide includes clear action steps to help you prepare for the new IMO regulations. Depending on the complexity of your vessel more steps may be needed to adequately protect against cyber attacks.”

By Rebecca Jeffrey


The Marine Corps Systems Command has announced that service is updating its tactical satellite system that provides increased communication on the battlefield.

Based on field user evaluations, the upgraded technology is performing beyond expectations.

The Mobile User Objective System is a next-generation, narrowband satellite communication capability that enables Marines to connect to SATCOM networks. It encompasses updated firmware to the AN/PRC-117G radio system and one of three antenna kits that help users simultaneously access these networks.

Initially fielded in March 2019, the system enables mobile or stationary Marines to leverage cellular technology to increase access to voice and data communication. It also improves overall reliability in urban environments.

“MUOS gives us a 3G capability using satellite constellations,” said Lt. Col. Jeff Decker, MCSC’s Ground Radios product manager. “It is similar to a cell phone capability in the sky that covers the entire globe.”

“We try to figure out anything that could be a possible issue for the warfighter. This helps to validate the concept of operations, and it allows us to provide lessons learned to other MEFs,” Lt. Col. Jeff Decker, MCSC’s Ground Radios product manager said.

The 3G networks used with MUOS remain far superior to the Marine Corps’ legacy SATCOM channels, said Decker. He noted that the Ground Radios program office continues to monitor the latest technologies and looks toward working with other services for future incremental improvements to the capability.

“We’re looking to support the warfighter with a lethal and sustainable capability, which is the command’s focus,” said Decker. “The more robust and resilient the capability, the more we can start adding on back-end systems to help Marines. MUOS is changing the way we look at a tactical satellite architecture.”

The importance of evaluations

From March to May 2020, MCSC conducted various field user evaluations with I Marine Expeditionary Force at Twentynine Palms, California, to assess an updated version of MUOS that increases network stability while executing missions.

During the testing, Marines participated in fire support simulation exercises where they employed MUOS for coordinated air strikes and mortar support. They also used the technology during scenario-based exercises that involved rehearsing command and control operations.

“We tested the system through user evaluation exercises to understand not only what the capability can do on paper, but how we can use it to increase lethality and provide redundancy across the [Fleet Marine Forces],” said Decker.

The testing enabled users to grow familiar with the system, ask questions and provide feedback. It allowed MCSC to learn more about MUOS, including the system’s strengths and limitations. Leveraging Marine feedback, the program office can make additional updates to MUOS as needed.

“We try to figure out anything that could be a possible issue for the warfighter,” said Decker. “This helps to validate the concept of operations, and it allows us to provide lessons learned to other MEFs.”

Eddie Young, project officer of Multiband Radio II Family of Systems at MCSC, said the testing helped the Ground Radios Team assess MUOS in combat-operational environments, which will better prepare them to employ the system during real missions.

“We wanted to bring in these units and make sure the system is working as it should,” said Young. “We want to ensure the warfighter’s needs are met.”

‘Exciting’ assessment results

Both Decker and Young said the feedback on the updated MUOS from Marines has been overwhelmingly positive, and that the system has exceeded performance expectations. Decker noted how Marines commended the new waveform for its lack of performance gaps, its adaptability and the absence of any technical difficulties while testing.

“Marines showed no frustration while trying to execute point-to-point calls while employing MUOS in an operational environment,” said Decker. “The system is doing what we expect it to do, and that is exciting.”

Sgt. Mason J. Roy, video chief for Communication Strategy and Operations at I MEF, participated in the communication exercises. He raved about the benefits of the exercises in training Marines for future missions that involve MUOS employment.

“I believe the exercises went really well,” said Roy. “The idea that we can send a video or photo from the field to a command post [using MUOS] shows we can rapidly inform commanders with visual information so that commands could potentially adjust battlespaces to promote mission accomplishment and protect our troops.”

The program office will begin fielding the updated version of MUOS this summer.

Source: defence-blog


Latent cyber risk. That’s what we in the cyber business call a cyber threat that is undetected, unplanned and unanticipated. These are the cyber risks that lurk in the dark places of your networks and the exposures that you didn’t think about that come out when you least expect.

Maritime has a lot of examples of these, such as when companies start connecting systems, devices and networks that were never designed to be connected. As fleets become more automated and digitized, we are connecting all sorts of systems—ones where cyber security was never even a consideration. The legacy networks don’t have the protection, updates or design to make them cyber resilient, because no one thought they would be connected when they were built. Hook up an old system to the internet, and you run the risk of unintentionally exposing it to a whole host of new cyber risks that you never considered.

Snap-back cyber risk

COVID-19 has its own latent cyber risk. With the sudden and unexpected onslaught of the COVID-19 pandemic, companies had precious little time to convert to an almost fully remote working environment. They scramble to adapt expanded and stretched networks way beyond their normal limits. As entire workforces switched to working from home, work networks mingled with home networks, people emailed documents to personal accounts and USB drives were used to help move and share files like never before.

Most IT departments have done a great job reworking their systems and networks to accommodate an immediate and severe shift in how they operate. However, they exchanged a lot of control for operational flexibility. Work offices became home offices, that also became home schools, entertainment centers, online shopping and part of family daily life. For months, work computers have been sitting on home networks and are used to help people cope with the realities of safer-at-home restrictions.
As a result, the attack surface – the exposure points that attackers can exploit – exploded. Add to that the COVID-19 related cyber scams that have employees unintentionally clicking on bad links, and you have a perfect environment for cyber malware and other exploitation to grow.

Now, many organizations are bringing everyone back to the workplace. Most are thoughtfully planning how to bring people back together. Temperatures will be taken, masks will be worn and social distances will be respected. However, few are considering how to reintegrate computers, devices and systems.

As networks snap back from their over-extension, they will bring back the cyber malware and exploits that could be infiltrating their over-extended networks. This is the latent cyber risk of COVID-19 and needs to be addressed.

It’s about safety

The snap-back risk of COVID-19 can have real-world consequences. Attackers are no longer only just interested in stealing data from corporate IT systems. They now are actively trying to understand how to take control of operational networks on-board vessels. This means they now want to take control of navigation systems, engines, valves, and anything else they can get their hands on. The operational networks that control these systems, called operational technology (OT), are uniquely exposed to these kinds of attacks. This is because, as you might guess, they were never designed to have the kind of connectivity we now have.

As attackers target OT systems, cyber security becomes a real-world cyber safety concern. Cyber risk impacts vessel, public, and environmental safety.
You cannot socially distance a network

Once your systems and networks are interconnected, and connected to the Internet, malware and intruders can spread almost instantaneously. The most you can do is segment, protect and monitor those networks. Unfortunately, too many OT networks do none of these.

Contact tracing a cyber attack is very difficult. Once in, it can be extremely hard to see where malware or an attacker has spread. It can spread in nanoseconds and attackers can be very skilled at covering their tracks. This is much harder in the OT environment, where it takes very specialized expertise to even understand how attack could spread.

No system is stand-alone. There is a perception that some systems are not connected to anything, thus they have an “air gap” and are not vulnerable. That is incorrect. From updates to operations, systems will have some form of connectivity, even if it is someone running an update from a disk. The general rule in cyber is, if someone can get to it, they will.

Cyber hyper-mutates

We are hoping the COVID-19 does not significantly mutate. Unfortunately, the nature of cyber is to hyper mutate. Every malware, every attack type and every mutation is being continuously adapted. Attackers are relentless at refining their attacks. Malware strains last months, weeks or days before new iterations come out. As we become more digital, we reshape the environment for cyber attacks. They respond by being in a constant state of change. You can’t only consider the last attack, you need to anticipate the next one.
We change. They change. We change. Constant vigilance, flexibility and adaptation is the nature of cyber.

You need good cyber hygiene

What can you do? First, you need to account and plan for cyber security. It is now a business imperative. It needs to be a daily part of operational and safety risk management. You then need to proactively manage it. This means that you need to create a cyber program that accounts for the assessment, planning, protection, defense, detection and response needed to minimize your cyber risks.

There are a number of cyber technologies, services and solutions that can help you protect your networks. Find the right partners who have the deep expertise in IT and OT environments, and work with them to build the program that fits your specific situation. Strong cyber hygiene can prevent most cyber infections. It can also help you handle a critical exploitation, if you are unfortunate enough to have to face one.

As for the COVID-19 snap back. You need to make it an integral part of your restart program. This could mean everything from new policies and education, to enhanced scanning, monitoring and management of IT and OT networks.

Remember that COVID-19 is not the only virus that your employees can bring back into your work place.
Source: ABS Group


Dryad Global’s cyber security partners, Red Sky Alliance, perform weekly queries of  backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usage is a common lure to entice users in the maritime industry to open emails containing malicious attachments.

With our cyber security partner we are providing a weekly list of Motor Vessels where it is observed that the vessel is being impersonated, with associated malicious emails.

The identified emails attempted to deliver malware or phishing links to compromise the vessels and/or parent companies.  Users should be aware of the subject lines used and the email addresses that are attempting to deliver the messages.

Tactical Cyber Intelligence Reporting

 

In the above collection, we see malicious actors attempting to use vessel names to try to spoof companies in the maritime supply chain.  This week we observed a wide variety of maritime-related subject lines.    Some of the new vessel names used this week include “MV EVIAPETROL V” and “MV XIU SHAN” among others. “Maersk Kleven” was used again this week. This vessel is currently flying under the Liberian flag and is a Hazard A (major) cargo ship.  It is currently headed from Charleston, US to Algeciras, Spain.

Analysts observed subject line “RE: MV WESTERN TOKYO 62,647DWT / LOADING CLINKER – REQUEST FOR PDA” being used in a malicious email this week.  The MV Western Tokyo is a bulk carrier currently sailing under the flag of the Philippines. The carrier is in port at WAFR – Gulf of Guinea.

This email message was sent from “shipping@san-nikolla.gr” which is likely owned by San Nikolla Shipmanagement S.A.  While the company is headquartered in Albania, the sender appears to be located in Greece, based on the .gr sending domain and the phone numbers provided in the email signature.  There is a web portal login located at “san-nikolla[.]gr” and the address and phone numbers in the email signature appear to be linked to the real San Nikolla Group.  The san-nikolla[.]gr “site is down for maintenance.”

The message body contains a request for a PDA (Profoma Disbursement Account).  As with many malicious emails, the greeting is generic “GOOD DAY DEAR SIRS” and the message contains an attached .xlsx file named “WESTERN TOKYO vessel description 201907 CoA.xlsx.”  When opened, this spreadsheet would activate Trojan:Win32/Vigorf.A malware.[1]  This malware has the ability to download, install, and communicate with other malware. It also has the ability to steal and exfiltrate sensitive information from the victim’s device.

Analysts observed another malicious email which appears to impersonate the M/V BBC Congo.  The malicious email subject line used is “M/V BCC CONGO – Port Agency Appointment.”  Although there were no results found for the “M/V BCC Congo,” there is an active general cargo ship sailing under the flag of Antigua Barbuda named “BBC Congo.”  The actual BBC Congo is currently on a voyage from China to Korea.[2]  The email states the ship will discharge between 22-25 June so it is possible the email is referencing a new vessel.

The sending email operation@inter-trans[.]co” does not appear to be registered to any legitimate company or listed on any company website.  The inter-trans[.]co domain leads to a Roundcube login port with Bulgarian text saying “Welcome” and offering a user/password field.

The sender, according to the email signature is Capt. Gultekin Ozturk, the “Managing Director,” but does not identify the name of the company.   He leaves his Skype, email, and phone contacts, as well as an address based in Turkey.

With the email written in English and the sender based in Turkey, the attached spreadsheet “vsl MV BCC CONGO.xlsx” is written in Chinese text.  One of the more unusual aspects of the email is the target email address “jameshall@compasspub.com.”  This email is owned by the International Sales and Marketing Coordinator for Compass Publishing, which is a Florida, US-based publishing company.  The target does not appear to have any relevance to the maritime industry or the BBC Congo specifically.

When the victim opens the attached spreadsheet, they are actually activating Exploit:O97M/CVE-2017-11882.L malware.[3]  This malware is one of the most common exploits seen “in the wild.”  It takes advantage of a memory corruption vulnerability in Microsoft Office products.  This allows attackers to extract sensitive and private information from the victim’s device.  If successful, an attacker could steal proprietary information from the publishing company.  They would also be able to commit impersonation attacks with insider information

Source: https://dryadglobal.com/


The Coronavirus pandemic is leaving the maritime and offshore energy sectors vulnerable to cyber-attack, with the maritime security firm Naval Dome citing a massive 400% increase in attempted hacks since February 2020. 

An increase in malware, ransomware and phishing emails exploiting the Covid19 crisis is the primary reason behind the spike. Naval Dome says that travel restrictions, social distancing measures and economic recession are beginning to bite into a company’s ability to sufficiently protect itself.

The global crisis and social distancing measures are preventing specialist maritime technicians flying out to ships and oil rigs to upgrade and service critical systems, resulting in operators circumventing established security protocols, leaving them open to attack.

IT and other maritime Operating systems (OT) are no longer segregated and individual endpoints, critical systems and components may become vulnerable. Some of these are legacy systems which have no security update patches and are even more vulnerable.

The increase in specialist maritime security personnel working remotely on home networks and personal computers and WiFi routers just makes the problem worse.

The economic downturn and the drop in the price of crude oil is also having an effect, with oil companies and contractors being faced with limited budgets available to implement effective cyber security measures. The Mission to Seafarers has published a COVID-19 special issue of its Seafarer Happiness Index report, which shows a growing feeling of confusion from crew changing as the landscape shifts around them. According to the report, shore leave, which is already a problematic issue, has become even more difficult for seafarers as ports are locked down and there are fears of contracting the virus.

Seafarers also reported feeling that not enough is being done to ensure the safety of those onboard and a feeling of loneliness, physical and mental exhaustion, and homesickness.

Shen Attacks
A report, written by the University of Cambridge Centre for Risk Studies last year, called the Shen Attack: Cyber risk in Asia Pacific Ports, says that a cyber attack on ports could cause substantial economic damage to a wide range of business sectors globally due to the inter-connectivity of the maritime supply chain.

The combination of ageing shipping infrastructure and complex supply chains makes the shipping industry vulnerable to attack and consequentially huge losses. 

While the Shen attack is not a definitive forecast, it does highlight the need for vigilance in an industry that could be brought to its knees by a cyber event originating in Asia and spreading to Europe, America and the rest of the world.

The report is the second publication from the Cyber Risk Management project, the Singapore-based public-private initiative that assesses cyber risks, of which Lloyd’s is one of the founding members. Shen Attack estimates that losses of up to $110 billion would occur in an extreme scenario in which a computer virus infects 15 ports. Transportation, aviation and aerospace sectors would be the most affected ($28.2 billion total economic losses), followed by manufacturing ($23.6 billion) and retail ($18.5 billion).

Source: https://www.cybersecurityintelligence.com/


Further to the recent news posting ‘Composing a Picture from the Puzzle Pieces’, this is the first of seven pieces that describe in more detail the make up of the puzzle and covers the maritime transport demonstrator. The goal of each demonstrator is to ‘put the correct pieces together’ which are firstly described through concrete use cases.

The Use Cases

Although the security requirements of maritime transport are vast and cover multiple areas of cyber security controls, based on the requirements’ analysis and the maritime transport research and development roadmap developed in earlier stages of the project, we have identified four concrete security services (use cases) that will be integrated and later demonstrated.

1.Threat modelling and risk analysis for maritime transport services

We identified targeted threats and risks for maritime transport that include various other use cases, which describe all the distinctive phases, such as:

  • critical maritime assets & services identification;
  • vulnerability management;
  • threat modelling & scenarios specification;
  • maritime transport risk analysis;
  • attack paths representation; and
  • maritime transport risk management.

2. Maritime system software hardening

Applications used in the maritime domain, such as software running on a moving vessel, usually utilize legacy code which is hard to update and sometimes even harder to replace. An attractive option is software hardening, whereby a program is re-written in order to avoid memory-related vulnerabilities. Re-writing the code can be done either by re-compiling the source (where possible) or by reconstructing the binary. Note that this re-writing is focused on the security properties of software and not on its base functionality. Hardening can be applied much more easily than a total replacement of the code.

3. Secure maritime communications

We examined the secure exchange of various types of information, including maritime-specific systems such as:

  • VHF data exchange system (VDES) frequencies;
  • automatic identification system (AIS) information;
  • maritime mobile service identity (MMSI), time, ship position, speed, course etc.;
  • vessel voyage information (such as route plans and mandatory ship reports);
  • maritime single window reporting information (e.g. ship certificates, log books, passengers’ lists and crew lists); and
  • port to vessel information, such as weather reports, passenger or cargo manifestos.

4. Trust infrastructure for secure maritime communication

As various types of information are exchanged/transmitted between different maritime stakeholders and actors at sea and on shore, designing a specially crafted trust infrastructure is vital. However, it is not straightforward to set up and operate a typical public key infrastructure (PKI) solution, since there are constraints associated with the maritime transport domain. The communication bandwidth of ship networks have to be taken into account. For example, the SATCOM component of VDES is expected to become a bottleneck in ship communication, due to its low capacity. In addition, it is not rare for ships to sail for long periods of time without any Internet connectivity at all; and, as shipping is a low cost business, this imposes strict limitations on what solutions will be acceptable to the industry. Here we will research those constraints and design and demonstrate a PKI service specifically adapted to fit the needs of the maritime domain.

The Demonstrator Set-up

Here is what the three demonstrators will illustrate:

(A) Threat modelling and risk analysis for maritime transport services using a web application utilising multiple modules to give a complete risk assessment process. The sequence of information insertion will ultimately lead to a complete asset map and multiple informative risk assessment result output forms.

(B) Maritime system software hardening firstly by enhancing the risk analysis framework realised in (A), and then hardening unsafe components used in (C).

(C) Secure maritime communications and trust infrastructure for secure maritime communication initially implementing the PKI service described in (4) and in the next phase will be extended to demonstrate the secure maritime communications, described in (3).

For more information on this phase of all the demonstrators, detailed descriptions can be found here.

Panayiotis Kotzanikolaou, University of Piraeus

Source: https://cybersec4europe.eu/


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED