IARM is a leading company's security system that helps maintain cyber security onboard ships and in companies. We help companies to understand, manage and communicate cyber risk. Help to prioritise and identify actions that can be taken to reduce cyber risk.
Cyber safety and cyber security are critical due to the potential effects they can have on personnel, ship, environment and cargo. IT Cyber security Services refers to the protection and management of IT, OT, data and information from unauthorised manipulation, disruption, and access. Cyber safety is concerned with the potential loss or corruption of safety critical data and/or OT.
A cyber-security incident that undermines the availability and integrity of the OT can result in cyber-safety issues. For instance, chart data corruption in an Electronic Chart Display and Information System (ECDIS), a failure occurring during maintenance and patchi, or loss or manipulation of external sensor data that is critical to the operation of a vessel. While cyber security in shipping incidents may have different causes than cyber safety incidents, both can be addressed with training and awareness.
Cyber risk management should identify and define the roles and responsibilities users, key people, management, both ashore, and the systems, assets, data and capabilities that could pose a threat to ships.Safety and Operations: Establish technical and procedural safeguards that prevent cyber attacks and ensure operation continuity. Also, implement activities to respond to and prepare for cyber attacks.
Cyber risk is unique to the ship, company, operation and/or trade. Companies must consider all aspects of their operations which could make them more vulnerable to cyber incidents when assessing the risk. Lets have a look of Cyber threats types, and how its works - Cyber Security in Shipping Industry
Cyber-threats: Types
Malware is malicious software that can access or damage computers without the owner's permission. There are several types of malware: trojans, ransomware and spyware, viruses, worms, and more. Ransomware locks down data on systems until payment is made. Locally, the ransomware may allow the user to execute malicious code, sometimes through email attachments, or via malicious websites.
Phishing: Sending emails to many potential targets asking them for confidential or sensitive information. A link included in an email might also be used to request that the recipient visit a fake website.
Water holding is a technique that allows you to create a fake website and then compromise a real website to make it more attractive to visitors.
Scanning entails randomly attacking vast portions of the internet.
Social engineering is the process of manipulating people's emotions. Potential cyber-attackers utilise a non-technical way to persuade insiders to violate security rules.
Brute force: An attack using multiple passwords in the hopes of getting it right. The attacker checks every possible password until they find the right one.
Denial-of-service (DoS): This is when legitimate and authorised users are prevented from accessing data, often by flooding a network. Distributed denial of service (DDoS), an attack that takes control of multiple computers or servers to launch a DoS attack.
Spear-phishing: This is similar to phishing, but individuals are sent personal emails that contain malicious software and links that download it automatically.
Subverting supply chains - Attacking a ship or company with compromised software or equipment.
The rapid adoption of new communication protocols and working practices in cyber security has led to some very interesting operational priorities. These are in contrast to cyber security in other sectors, such as the maritime industry. Our cyber security experts have had to quickly develop their skills and take advantage of our experience in protecting every industry, from spacecraft to maritime to renewable energy plants and banks.
Our cyber security services and technologies are constantly being improved to meet the demands of the industry. Our in-depth knowledge and foundation in cyber security have helped us secure some of the most important cyber security systems in the world.
IARM brings with them the same threat of remote attack that any other vessel connected to the Internet faces. They also have other important soft spots that must be protected, including the owners and clients of high net worth who are on board. We offer a range of services to help shipping industries, IT Services, crew and management companies.
About Author,
Dharshini, a security consultant from IARM. She is the individual who will enthusiastically take initiative, goal-oriented senior professional with solid experience in Information and Cyber Security Services.