Maritime Cyber Risks – What is real, what is fiction?

Slides:



Advertisements
Similar presentations
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Advertisements

 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
7 Effective Habits when using the Internet Philip O’Kane 1.
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Cyber X-Force-SMS alert system for threats.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Lecture 11 Reliability and Security in IT infrastructure.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
How To Provide For Cybersecurity NCBFAA April 23, 2015 © MS&K
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Advanced Persistent Threats (APT) Sasha Browning.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
INTRODUCTION & QUESTIONS.
Safe’n’Sec IT security solutions for enterprises of any size.
Security Mindset Lesson Introduction Why is cyber security important?
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Issues for Computer Users, Electronic Devices, Computer and Safety.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
October 28, 2015 Cyber Security Awareness Update.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Security Risk Profiles – Tips and Tricks
Answer the questions to reveal the blocks and guess the picture.
Cybersecurity EXERCISE (CE) ATD Scenario intro
Forensics Week 11.
Jon Peppler, Menlo Security Channels
Cyber Crimes Chunlian QU 9/18/2018.
Cybersecurity Awareness
Data Security Team 1.
Risk of the Internet At Home
Social Engineering No class today! Dr. X.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Faculty of Science IT Department By Raz Dara MA.
Cybercrime and Canadian Businesses
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Strategic threat assessment
LO1 - Know about aspects of cyber security
Presentation transcript:

Maritime Cyber Risks – What is real, what is fiction? CyberKeel Maritime Cyber Risks – What is real, what is fiction? April 9th 2015 Lars Jensen CEO CyberKeel

Current state of affairs The level of cyber security currently is at a very low level in the maritime industry State-of-the-art firewall and anti-virus software is ineffective in keeping out dedicated attacks Social engineering tactics work very well When we ask about cyber security protection, almost all answer in terms of their technology to keep intruders out. Very few can answer the questions: “How do you detect the ones who are already inside?” and “How do we operate given the knowledge that we may at any time be compromised?” ©2015 CyberKeel

But is there a problem – in reality? ©2015 CyberKeel

A carrier losing track of all containers CyberKeel recently released a whitepaper as well a new monthly newsletter focused specifically on cyber threats. Key focus: what is real and what is fiction. 2011: Cyber attack on Iranian container carrier IRISL Attacks damages all data related to: Rates Cargo number Date Place Compounding the problem was a simultaneous elimination of the company’s internal communication network ©2015 CyberKeel

A brief look at actual maritime incidents Stealing money through man-in-the-middle attack Smuggling drugs and deleting containers from a port Zombie Zero: Using barcode scanners to gain entry to financial systems Icefog: backdoor access to Japanese and Korean companies (extract documents, gain email access, obtain passwords) Bypassing Australian customs Destabilization of drilling platform Shutting down a drilling platform by malware infection Complete compromise and spoofing of AIS GPS Jamming Manipulation of ECDIS data Remote navigation of an 80 million dollar yacht using 3000 USD worth of equipment Facebook as pirate intelligence source ©2015 CyberKeel

Helpful examples from other industries Shamoon attack on Saudi Aramco – wiping all computers Stuxnet virus targeting industrial control systems in Iran which were not online Successful hacking of cars ©2015 CyberKeel

Current security is low CyberKeel evaluated the top-50 container carriers’ websites in Q4 2014 37 of 50 appear completely open to simple attacks towards back-end systems 6 allow harvesting of usernames 8 carriers, controlling 38% of global trade, allow “password” as a password to access sensitive eCommerce applications 2 carriers allow “x” as password Spoof domains are in place vis-à-vis 10 out of top-20 carriers ©2015 CyberKeel

Current security is low CyberKeel evaluated a range of maritime companies for “misspelled” domain names in Q1 2015 A large range of companies we seen to be potential targets A few examples just for illustration: gearbulk.com -> gearrbulk.com arkasbunker.com -> arkasbunkers.com monjasa.com -> m0njasa.com 10 out of top-20 container carriers had such “misspelled” domains Further testing shows that 18 out of the top-20 container carriers have nt prevented simple click-jacking via iFrame attacks – an attack particularly suitable for exploiting misspelled domain names ©2015 CyberKeel

Current security is low Organizational issues, and understanding, is a major bottleneck Often IT departments are only in charge of land-based IT systems – a technical organization is in charge of vessel IT Awareness of the implications that a vessel – and its equipment ! – has to be considered as being just accessible as any landbased computer being online When chartering vessels, the operating company is often see not to have specific cyber security requirements The usage of agencies, many of which are 3rd party, leads to multiple entries into the company’s back-end systems with limited control over cyber security aspects Physical security officers are often unaware of the role they need to take in terms of cyber security Non-IT staff have a very low level of awareness in relation to cyber risk behavior Awareness that theft of information is a key element in fraud ©2015 CyberKeel

Who are the attackers? ©2015 CyberKeel 3 main groupings: Criminals Motive: make money Current prime tools: steal money through fraud, facilitate smuggling, ransomware Hacktivists Motive: make a political statement, create destruction Current prime tools: destroy/impede infrastructure, publicize sensitive information, take over communication channels Governments (or government affiliated entities) Motive: Espionage, create the ability to influence critical infrastructure Current prime tools: APT attacks aimed at remaining undetected ©2015 CyberKeel

What should be done? Increase awareness of the realistic threat picture Maritime companies need to develop contingency plans as well as counter-measure plans Improved training & awareness at all levels from board and C-Level to regular staff Development of industry-wise cyber security standards Establishment of a trusted environment in which maritime companies can share cyber attack information If you cannot answer the question: “How do you detect the unauthorized people within your system” you have a problem ! ©2015 CyberKeel