Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry



Similar documents
National Cyber Crime Unit

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Small businesses: What you need to know about cyber security

Cybercrime: risks, penalties and prevention

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Identifying Cyber Risks and How they Impact Your Business

Cyber Risks and Insurance Solutions Malaysia, November 2013

Small businesses: What you need to know about cyber security

NEW ZEALAND S CYBER SECURITY STRATEGY

Cyber Security for audit committees

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

Mitigating and managing cyber risk: ten issues to consider

Audit summary of Security of Infrastructure Control Systems for Water and Transport

developing your potential Cyber Security Training

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

THE HUMAN COMPONENT OF CYBER SECURITY

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

SPEAR PHISHING UNDERSTANDING THE THREAT

Cyber Essentials Scheme


Practical Steps To Securing Process Control Networks

CYBER SECURITY IN VIETNAM MULTI-CHAMBER MEETING - 22 OCTOBER 2015

CYBER SECURITY TRAINING SAFE AND SECURE

ACE European Risk Briefing 2012

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

Cyber Essentials Scheme

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

September 20, 2013 Senior IT Examiner Gene Lilienthal

How To Protect Your Business From A Cyber Attack

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

Managing Cyber Risk through Insurance

HMG Security Policy Framework

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

The UK cyber security strategy: Landscape review. Cross-government

Protecting Organizations from Cyber Attack

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Unit 3 Cyber security

Introduction to Cybersecurity Overview. October 2014

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Cyber security Building confidence in your digital future

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

A NEW APPROACH TO CYBER SECURITY

Cyber Security Strategy

Promoting a cyber security culture and demand compliance with minimum security standards;

Vulnerability Assessment & Compliance

The Cyber Threat Profiler

Cyber Security for SCADA/ICS Networks

Fraud and Abuse Policy

National Cyber Security Policy -2013

Addressing Cyber Risk Building robust cyber governance

How Secure is Your SCADA System?

CYBER SECURITY THREAT REPORT Q1

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Resilience and Cyber Essentials

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Assessing the strength of your security operating model

Chapter 3.3: IT and Cloud Computing

Sytorus Information Security Assessment Overview

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

CYBER SECURITY INDUSTRY GUIDELINES

CYBER SECURITY Audit, Test & Compliance

Information Security Breaches Survey 2013

Cyber Crime Research. Presentation by the Australian Institute of Criminology. Dr Russell G Smith Principal Criminologist

A practical guide to IT security

Cyber security Indian perspective & Collaboration With EU

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour

I ve been breached! Now what?

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

The enemies ashore Vulnerabilities & hackers: A relationship that works

External Supplier Control Requirements

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Department for Business, Innovation and Skills 1 Victoria Street London SW1H 0ET. 7 th May Dear Sir or Madam,

2 Gabi Siboni, 1 Senior Research Fellow and Director,

CYBER RISK SECURITY, NETWORK & PRIVACY

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

HMG Security Policy Framework

Master of Science in Cyber Security and Management

The Human Component of Cyber Security

How do we Police Cyber Crime?

Qatar Computer Emergency Team

Transcription:

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Templar Executives NIAS 2007 DHR 2008 IAMM 2008 1 st CSS 2009 2 nd CSS 2011 Advising Government & Industry National Information Assurance Strategy; Data Handling Report; Information Assurance Maturity Model; National Cyber Security Strategies; MOD Information Assurance Strategy; MOD Information Assurance Programme; Government Information and Communications Technology Strategy: creation of the Office of the Government Senior Information Risk Owner and the Senior Cyber and Risk Assurance Board. Picture Source: https://www.gov.uk MOD IAS 2009 MOD IAP 2010 Action 25 2012 OGSIRO FTSE 100s 2013/14/15 MOD

Templar Footprint

What does Cyber Security Mean to You?

Why Cyber Security is Important There is an ever increasing dependence on technology and information is the lifeblood of organisations; Information is a critical asset for any organisation and needs to be both protected and exploited; The threat is increasing and is more diverse in nature malicious and non-malicious human behaviour is a key weakness; It is essential that every organisation understands and mitigates these risks as well as embedding a strong information security culture.

Why Cyber Security is Important There are now three certainties in life: Death; Taxes; And a foreign intelligence service all over your systems. - Director of Cyber Security, The Security Service MI5, June 2013

Our Increasing Reliance on Cyber In 2015, 3, 144,203, 400 people across the World access the internet every day, 2 billion more than in 2005, when directly comparable records began; Access to the internet using a mobile phone grew by 5.1% to 4.55 billion users in 2014; 74% of all adults bought goods or services online in 2014, up from 53% in 2008; UK online shoppers are to spend an average of 1,174 each in 2015, up from 9.6% in 2014; In Great Britain, 22 million households (84%) had Internet access in 2014, up from 57% in 2006. Fixed broadband Internet connections were used by 91% of households. Source: ONS Aug 2014

Information Layer: there are now no boundaries We are here! We are here! icture Source: http://en.wikipedia.org/wiki/file:internet_map_1024.jpg

Threats THREATS TYPES OF THREATS HUMAN FACTOR SOCIAL ENGINEERING PHISHING & SPEAR PHISHING MALWARE CYBER TERRORISM MALICIOUS CYBER WARFARE CYBER ESPIONAGE PEOPLE INTERNAL EXTERNAL NON-MALICIOUS PEOPLE ENVIRONMENTAL HAZARDS CYBER CRIME HACKTIVISM

Type of Insider Incident Unauthorised disclosure of information; Process Corruption; Facilitation of third party access; Physical Sabotage; Electronic or IT Sabotage.

Maritime Physical Security BMP4/ISPS Code Best Management Practices for protection against Somalia based piracy Suggested Planning and Operational Practices for Ship Operators and Masters of ships transiting the High Risk Area

Contributing Factors Cloud Capability The ability to connect and to synchronise multiple devices over a network. Cost savings vs. Social vs. Security. Professional. Sharing documents. Personal devices.

Threats THREATS TYPES OF THREATS HUMAN FACTOR SOCIAL ENGINEERING PHISHING & SPEAR PHISHING MALWARE CYBER TERRORISM MALICIOUS CYBER WARFARE CYBER ESPIONAGE PEOPLE INTERNAL EXTERNAL NON-MALICIOUS PEOPLE ENVIRONMENTAL HAZARDS CYBER CRIME HACKTIVISM

Cyber Terrorism The use of network based attacks (including the Internet) in terrorist activities, including attacks that lead to physical sabotage and acts of deliberate, large-scale disruption of computer networks.

Cyber Warfare Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.

Cyber Espionage Obtaining information from individuals, competitors, rivals, groups or governments for personal, economic or other advantage using illegal exploitation methods on information and communications technology.

Cyber Crime Any crime that involves a computer and networks, executed through ICT.

Hacktivism Online activities that promote ideological, religious or political views, usually without direct financial gain to the perpetrator.

Threat Implications Business disruption; Incident response cost; Financial loss; Damage to reputation; Contingency planning; Fines, legal and/or regulatory issues.

The Next Cyber Playground AIS Hack

ACME SHIPPING EMPORIUM

DROP BOX Threats on your door step LIVE FEED OF SHIPS IN ARABIAN GULF UNSECURED WIFI UNLOCKED SAFE ACCESS PASS POSITION, COURSE AND SPEED OF SHIPS CONTRACT DETAILS FOR PARTNERSHIP DRAFT MANIFEST IN THE BIN LAUNCH DETAILS

ECDIS Last year, a research team from software security consultants NCC Group discovered several weaknesses within an ECDIS demo product, which enabled them to access and modify ECDIS files and insert malicious content. If exploited in a real scenario, these vulnerabilities could cause serious environmental and financial damage. Yevgen Dyryavyy, security consultant at NCC Group, said that access to ECDIS on vessels is somewhat restricted, but this should not be used as a sole defence mechanism. An ECDIS could still be accessed through a USB stick or an online chart update or even sensor compromise or other systems that's connected to the vessel s local area network. - https://www.nccgroup.trust/uk/about-us/newsroom-and-events/news/2014/august/cyberattack-threat-intensifies-in-marine-sector/

Connectivity NCC Group; Preparing for Cyber Battleships Electronic Chart Display and Information System Security; 2014

A Doomsday Scenario?

Sign up for our regular newsletter: enquiries@templarexecs.com Tel: +44(0)844 443 6243 83, Victoria Street, London, SW1H 0HW. http://www.templarexecs.com @templarexecs.com