1 / 6

Maritime Cyber Security in the Commercial Cargo C ontrol sector

Maritime Cyber Security in the Commercial Cargo C ontrol sector. Justin Dunning. The Mission. Follow the cargo through its voyage Observe all of the touch points that a container goes through Determine if those touch points are susceptible to a cyber attack

wren
Download Presentation

Maritime Cyber Security in the Commercial Cargo C ontrol sector

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Maritime Cyber Security in the Commercial Cargo Control sector Justin Dunning

  2. The Mission • Follow the cargo through its voyage • Observe all of the touch points that a container goes through • Determine if those touch points are susceptible to a cyber attack • Once vulnerabilities are detected, determine the following: • Possibility • Severity

  3. Who Would Disturb the Flow? • Drug Cartels • Drug trade is worth $435 Billion • Increased from $320 Billion in 2005 • Arms Distributors • Arms trade is worth between $45-60 Billion a year • Thieves • Can make a decent amount of money on the black market

  4. Who and What are Vulnerable? • RFID Tags • Possibility: High • No uniformity= easily counterfeited • Severity: High • Could contribute to drug, arms trade, and theft • Freight Forwarder/3PL • Possibility: High • Email information is easily attackable • Severity: High • Contribute to high confusion in ports halting operations

  5. Who and What are Vulnerable? • Algorithms • Possibility: Low • Must be highly skilled to decrypt these • Severity: High • Could alter the position on the vessel • Electronic Data Interchange (EDI) • Possibility: Medium • Makes it possible for many people to view • Severity: Medium • Has the potential to effect the flow of supply chain because information is not confidential to necessary personnel

  6. Who and What are Vulnerable? • The Ports • Possibility: Low • Take measures to protect but wont be 100% protected • Severity: High • If this happens, halting the port for numerous days would affect the local economy • DDoS Attack • Possibility: Low • Measures put in place to protect their servers • Severity: High • This would shut down every port function at the same time

More Related