Cyprus Shipping Chamber – Cyber Security Vulnerability Management Case Study

(http://www.MaritimeCyprus.com) There is a perception within the shipping industry that where cyber security is concerned; “it can’t happen to us”. The implementation of effective cyber security management, especially onboard vessels is a low-level priority and that simple anti-virus protection or that introducing an air-gap between critical systems is adequate.

The truth of the matter is however, that with the rapid increase in digitalization and interconnectedness for all major systems; communications, navigation and automation onboard, ships and their offices are at now at a higher risk of attack than ever. (read further below)

The well-publicized NotPetya ransomware attack on Maersk in late June 2017 cost the company up to US$300 million. There are many more cyber-attacks that have gone unreported. As well as external threats, vessels are subject to internal attack whether unwittingly through the use of corrupted USBs’ for example or through malicious attack by disgruntled employees or crew members.

The Cyprus Shipping Chamber recognizing the need to make the shipping industry aware of the increasing cyber threats both from within and without, has developed this second study on Vulnerability Management to provide guidance on effective cyber security management. This Case Study is not an all-inclusive or exhaustive guidance or evaluation. It will be a dynamic document which will be updated with the latest developments on cyber security as they become available. Furthermore, comments to be received from readers will also be helpful to improve this document. Comments to be sent by clicking here.

Click on below image to download document.

Source: Cyprus Shipping Chamber (CSC)

Advertisements

One thought on “Cyprus Shipping Chamber – Cyber Security Vulnerability Management Case Study

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.