wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

profile
16_Abhay Kamble
Oct 20, 2021
0 Likes
0 Discussions
107 Reads

The current cyber security vulnerabilities and countermeasures in smart ship systems. It demonstrated that malicious attacks and incidents with devastating consequences are not only possible, but imminent. The maritime domain leverages cyber technologies to assure the safety and efficiency of operations at sea but vessels, platforms, satellites, and onshore facilities are increasingly interconnected, exposing them to an abundance of systemic and technology based threats.

The outlined the flaws in existing information technology networks on board and concluded that the high level of complexity and shared resources create a wide attack surface which should be segmented and secured systematically. Industrial Control Systems are often built on legacy infrastructure and implemented without security in consideration. Networking capabilities supplement these systems to allow remote control and troubleshooting but at the same time expose them to the IT network and its inherent vulnerabilities.

Vessel operators depend on the Automated Identification System for traffic and emergency services. Flaws discovered in the underlying hardware, software, and protocols would allow an adversary to manipulate the transmitted data and this could lead to navigational decisions with devastating outcomes. The Electronic Chart Display Information System equipment is equally unsecure and susceptible to malicious tampering. It often runs on legacy systems with well published vulnerabilities and the software itself can be misused to manipulate maps and sensor data which can compromise the safe navigation at sea.

Very Small Aperture Terminals provide geospatial capabilities for many critical services on board. The data flow between satellites and terminals is unencrypted and provides no integrity checks. Terminals can be tracked over the public internet and many interfaces are not locked down. An attacker could remotely log in to the exposed device and change critical information as well as using it as an entry point to pivot through the connected ship network.
The presented countermeasures were explained in the context of the multi-layered “Defence-in-depth” approach. Further recommendations were based on the implementation of security related policies and procedures.The maritime domain is moving fast towards the paradigm of “smart” transportation with more innovative technologies and AI driven decision-making. While this implies a wealth of benefits for economy, critical infrastructure, and military, it also increases the complexity of the threats to the maritime community before we have discovered and mitigated the flaws in existing systems and legacy technology. The current coverage of research in the field of maritime cyber security is sporadic and fragmented, leaving many stakeholders unaware of the risks and unprepared to treat them.

The cyber security community has the urgent obligation to support the shipping industry with research, tools, security assessments, and education programs. In doing so, we will enable organisations to make informed strategic decisions and effectively allocate resources to protect each member and the maritime community as a whole.Future work based on the present paper will aim to map all identifiable risks and to establish a status quo of the cyber security posture of the maritime sector.


Comments ()


Sign in

Read Next

LIFEHACKER

Blog banner

Save Girl Child

Blog banner

LinkedIn

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Constrained Management in IT

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Population

Blog banner

OS Assignment 3 Deadlock

Blog banner

Rapido

Blog banner

Article on different management system

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Esri India launches Policy Maps.

Blog banner

IoT Evolution

Blog banner

Technological Advancement

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Rain bow

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Evolution of Operating system.

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Memory Management in Operating System

Blog banner

Deadlock and Starvation

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Decoding Confusion Matrix

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

E-commerce

Blog banner

Video games

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Bit Coins

Blog banner

GIS REMOTE SENSING

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Review on Recovering Deleted Files

Blog banner

Process and Threading

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

semaphores

Blog banner

PERT Overview

Blog banner

What are Virtual Machines

Blog banner

Microsoft Windows Overview

Blog banner