Maritime Cyber Security in the Commercial Cargo Control sector Justin Dunning.
-
Upload
horatio-clark -
Category
Documents
-
view
217 -
download
3
Transcript of Maritime Cyber Security in the Commercial Cargo Control sector Justin Dunning.
Maritime Cyber Security in the Commercial Cargo
Control sectorJustin Dunning
The Mission
• Follow the cargo through its voyage
• Observe all of the touch points that a container goes through
• Determine if those touch points are susceptible to a cyber attack
• Once vulnerabilities are detected, determine the following:
• Possibility
• Severity
Who Would Disturb the Flow?
• Drug Cartels
• Drug trade is worth $435 Billion
• Increased from $320 Billion in 2005
• Arms Distributors
• Arms trade is worth between $45-60 Billion a year
• Thieves
• Can make a decent amount of money on the black market
Who and What are Vulnerable?
• RFID Tags
• Possibility: High
• No uniformity= easily counterfeited
• Severity: High
• Could contribute to drug, arms trade, and theft
• Freight Forwarder/3PL
• Possibility: High
• Email information is easily attackable
• Severity: High
• Contribute to high confusion in ports halting operations
Who and What are Vulnerable?
• Algorithms
• Possibility: Low
• Must be highly skilled to decrypt these
• Severity: High
• Could alter the position on the vessel
• Electronic Data Interchange (EDI)
• Possibility: Medium
• Makes it possible for many people to view
• Severity: Medium
• Has the potential to effect the flow of supply chain because information is not confidential to necessary personnel
Who and What are Vulnerable?
• The Ports
• Possibility: Low
• Take measures to protect but wont be 100% protected
• Severity: High
• If this happens, halting the port for numerous days would affect the local economy
• DDoS Attack
• Possibility: Low
• Measures put in place to protect their servers
• Severity: High
• This would shut down every port function at the same time