Module 4 Case Paper: Maritime Security
Introduction
Maritime cyber attacks have already occurred in recent history, indicating the threat that cyber warfare poses for maritime security. The reality of this situation is so pressing that new International Maritime Organization (IMO) Cyber Security regulations are set to come into effect in 2021 (Klopper, 2019). This paper will discuss the growing maritime threats that have been brought about by advances in technology as well as the potential countermeasures to protect ports and ships from involuntarily participating in a WMD terrorist attack.
Growing Maritime Threats Brought about by Advances in Technology
Growing maritime threats that have come about as a result of technological advances include the ability of hackers to penetrate computer systems from thousands of miles away and that ability of spoofers to spoof GPS signals and thus reroute ships and potentially crash them. Two incidents in recent memory have already occurred showing that both of these threats are real. The first is the Norsk Hydro Aluminium Smelter attack and the second is the February 2019, the Port of New York incident the US Coast Guard announced that a “deep draft vessel on an international voyage bound for the Port of New York and New Jersey reported that it was experiencing a significant cyber incident impacting its shipboard network” (U.S. Coast Guard, 2019). The malware attack experienced by the vessel caused it to lose important cybersecurity measures, meaning it became vulnerable to additional attacks. Malware similarly affected the Norsk Hydro Smelter. The Norsk Hydro Aluminum Smelter attack caused operations to halt as the plant battled to regain control of...…Today’s drones are flown from hundreds of miles away. If ships can be navigated by safe systems that are resistant to penetration, it would help to prevent takeovers of ships and protect ports.
Finally, the Container Security Initiative (CSI) is important to maintain, as it ensures that every container is inspected by maritime security forces prior to loading and shipping. This could prevent the kind of situation in which a ship is hacked and a container detonated by remote.
Conclusion
Maritime security is a serious issue that needs to be addressed so as to reduce the risk of injury to people on board on at ports. The best ways to improve security are often the simplest—improving end user knowledge, improving network safety fundamentals, and improving container inspection.
References
Charoen, D., Raman, M., & Olfman,…
References
Charoen, D., Raman, M., & Olfman, L. (2008). Improving end user behaviour in password utilization: An action research initiative. Systemic Practice and Action Research, 21(1), 55-72.
Fouche, G. & Solsvik, T. (2019). Aluminum maker Hydro battles to contain ransomware attack. Retrieved from https://www.reuters.com/article/us-norsk-hydro-cyber/aluminum-maker-hydro-battles-to-contain-ransomware-attack-idUSKCN1R00NJ
Klopper, E. (2019). The importance of maritime cybersecurity. Retrieved from https://cyber1.com/press-release/the-importance-of-maritime-cybersecurity/
U.S. Coast Guard. (2019). Cyber Incident Exposes Potential Vulnerabilities Onboard Commercial Vessels. Retrieved from https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/CG-5PC/INV/Alerts/0619.pdf
International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts
The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored
Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported
Maritime Insurance Marine/maritime insurance has a history that dates back many hundreds of years, but is also an important component of vessels on the high seas in 2013. This paper covers the history of maritime insurance and brings the subject up-to-date with material from the recent literature. History of Maritime Insurance The growth of maritime insurance companies in the eighteenth century was "…one of the major developments in the history of English commerce,"
Maritime Labor Convention Many seafarers ply across waters distant miles away from their homes. The categories of people in the maritime transport include the seafarers and ship owners. These people are often from different nationalities as ships operate under different flags, from their origin to other countries. The seafarers often face difficult conditions of working from their occupational risks. The fact that they work far from homes exposes them to challenges
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now