Verified Document

Maritime Security Essay

Module 4 Case Paper: Maritime Security
Introduction

Maritime cyber attacks have already occurred in recent history, indicating the threat that cyber warfare poses for maritime security. The reality of this situation is so pressing that new International Maritime Organization (IMO) Cyber Security regulations are set to come into effect in 2021 (Klopper, 2019). This paper will discuss the growing maritime threats that have been brought about by advances in technology as well as the potential countermeasures to protect ports and ships from involuntarily participating in a WMD terrorist attack.

Growing Maritime Threats Brought about by Advances in Technology

Growing maritime threats that have come about as a result of technological advances include the ability of hackers to penetrate computer systems from thousands of miles away and that ability of spoofers to spoof GPS signals and thus reroute ships and potentially crash them. Two incidents in recent memory have already occurred showing that both of these threats are real. The first is the Norsk Hydro Aluminium Smelter attack and the second is the February 2019, the Port of New York incident the US Coast Guard announced that a “deep draft vessel on an international voyage bound for the Port of New York and New Jersey reported that it was experiencing a significant cyber incident impacting its shipboard network” (U.S. Coast Guard, 2019). The malware attack experienced by the vessel caused it to lose important cybersecurity measures, meaning it became vulnerable to additional attacks. Malware similarly affected the Norsk Hydro Smelter. The Norsk Hydro Aluminum Smelter attack caused operations to halt as the plant battled to regain control of...…Today’s drones are flown from hundreds of miles away. If ships can be navigated by safe systems that are resistant to penetration, it would help to prevent takeovers of ships and protect ports.

Finally, the Container Security Initiative (CSI) is important to maintain, as it ensures that every container is inspected by maritime security forces prior to loading and shipping. This could prevent the kind of situation in which a ship is hacked and a container detonated by remote.

Conclusion

Maritime security is a serious issue that needs to be addressed so as to reduce the risk of injury to people on board on at ports. The best ways to improve security are often the simplest—improving end user knowledge, improving network safety fundamentals, and improving container inspection.

References

Charoen, D., Raman, M., & Olfman,…

Sources used in this document:

References

Charoen, D., Raman, M., & Olfman, L. (2008). Improving end user behaviour in password utilization: An action research initiative. Systemic Practice and Action Research, 21(1), 55-72.

Fouche, G. & Solsvik, T. (2019). Aluminum maker Hydro battles to contain ransomware attack. Retrieved from https://www.reuters.com/article/us-norsk-hydro-cyber/aluminum-maker-hydro-battles-to-contain-ransomware-attack-idUSKCN1R00NJ

Klopper, E. (2019). The importance of maritime cybersecurity. Retrieved from https://cyber1.com/press-release/the-importance-of-maritime-cybersecurity/

U.S. Coast Guard. (2019). Cyber Incident Exposes Potential Vulnerabilities Onboard Commercial Vessels. Retrieved from https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/CG-5PC/INV/Alerts/0619.pdf


Cite this Document:
Copy Bibliography Citation

Related Documents

Research Approaches in Maritime Security
Words: 6550 Length: 2 Document Type: Essay

International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts

Cyber Security Most Important Cyber
Words: 2328 Length: 8 Document Type: Research Paper

The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored

Cyber Security Cloud Computing
Words: 1389 Length: 4 Document Type: Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Maritime Insurance Marine/Maritime Insurance Has a History
Words: 2049 Length: 6 Document Type: Essay

Maritime Insurance Marine/maritime insurance has a history that dates back many hundreds of years, but is also an important component of vessels on the high seas in 2013. This paper covers the history of maritime insurance and brings the subject up-to-date with material from the recent literature. History of Maritime Insurance The growth of maritime insurance companies in the eighteenth century was "…one of the major developments in the history of English commerce,"

Maritime Labor Convention Many Seafarers Ply Across
Words: 2983 Length: 10 Document Type: Essay

Maritime Labor Convention Many seafarers ply across waters distant miles away from their homes. The categories of people in the maritime transport include the seafarers and ship owners. These people are often from different nationalities as ships operate under different flags, from their origin to other countries. The seafarers often face difficult conditions of working from their occupational risks. The fact that they work far from homes exposes them to challenges

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now