20 cities in Texas were hit by a coordinated ransomware attack
infosec

20 cities in Texas were hit by a coordinated ransomware attack

Twenty Texas local governments have been hit by a coordinated ransomware attack, the Information Resources Department announced Friday ...
Read More
infosec

Binance compensates the hacker who hacked it!

Binance, the cryptocurrency exchange company, intends to compensate the white hat hacker who breached his domain name and ...
Read More
infosec

The hacker who invaded Capital One has hacked other 30 companies

Further investigation into Paige A. Thompson, the hacker accused of causing data breach on Capital One, showed ...
Read More
infosec

Instantly update Windows 10 users. Critical vulnerabilities identified!

Microsoft warns Windows 10 users to update their operating system immediately because of two critical vulnerabilities. OR...
Read More
infosec

European Central Bank hacked!

The European Central Bank (ECB) closed one of its websites on Thursday after being hacked and infected by a hacker ...
Read More
Latest Posts

Are Ships Safe from Cyber ​​Attacks?

attacks

Nowadays even ships are in danger of being attacked hacking. The new systems they use to connect with the outside world to provide better experiences and services to workers and passengers has made them a new one goal for hackers.

There are new ones threats that can affect them systems of boats. Today, shipping companies want to control all of a ship's systems, from engines and tows to propellers and coils. This requires the operating systems that control them to be embedded in IT systems, which can be managed by the land so that they can assess the status of a ship. This certainly provides greater predictability in many of the shipping companies' operations, but at the same time it can enable malicious actors to attack ship systems and third parties. So how much safe are ships, especially those that have just been built?

Hackers can find ways to enter a ship's OTs through computer systems. A penetration test program can find out if there are connections between IT and OT systems that have not been taken into account and could allow unauthorized people to enter the ship's systems. When the systems IT embedded in OT, can cause very dangerous consequences from attacks.

As more and more companies integrate their IT systems into the ship's operating systems, the more exposed they are to potential attacks by hackers.

There are four steps to be followed by shipping companies to reduce the risk of attacks:

  1. Perform safety tests using professional penetration testers who understand the shipping industry. A Security Expert on cyberspace works and thinks like a malicious hacker, revealing the security gaps you have in your networks and operating systems that can enable attacks to take place.
  2. Monitor networks related to IT and IT systems. This can be done using sensors that "sense" the data stream on the network and look for deviations.
  3. Ensure that notices are handled around the clock. If tracking detects anomalies, analysts will verify the incident as malicious and will determine how it will be addressed in an effective way.
  4. Managing incidents. If the alert is serious, take steps to avoid a successful attack. Make sure you work with experts who can handle the challenges immediately before they develop and damage the crew, the boat, the load, the environment and even the reputation company.

The security of IT and OT systems on board ships is still relatively new, so there are no adequate legal requirements. However, there are some standards - such as International Maritime Operation (IMO) Resolution MSC.428 (98), the Regulation on Networks and Information Services (NIS), the Maritime Safety Act (MTSA) and the SIRE (VIQ7) inspection questionnaire provide guidance and many buyers require ships and shipping companies to operate in accordance with these standards.

Share
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *