SlideShare a Scribd company logo
1 of 7
Cyber Security Awareness Course
1
GEORGE PAPAIOANNOU
crontab Cyber Security
George.papaioannou@crontab.eu
Session 1
Cyber Security News
Shipping Industry
• Three main areas vulnerable to cyber security attacks
• Automation & Control Systems
• Navigation Systems
• Communications Systems
Cyber Security News ⇒ Shipping
• Automation & Control Systems: (Real Story, 2015)
– A hacker was contracted via Dark Web to gain access to control or navigation
systems onboard vessels operated by the Trans-Pacific Shipping Line.
– A Russian hacker gained access to a crewmember’s outdated and unpatched
computer onboard the Pacific Trader (IMO: 9406922)
– A tool was installed which reboots the computer used in the automation and
control system of the ship.
– Hacker determines that Pacific Trader is likely headed into port in Hong Kong
and he is posting a message in a
different private dark web chatroom.
Cyber Security News ⇒ Shipping
• Automation & Control Systems: (Real Story, 2015)
– On a rooftop in Hong Kong, a young college student pulls an aerial drone out of her backpack.
– Using the cover of darkness she lands the drone on the top of the pilot house and releases
explosives in a box.
– Repeating this process twice more, she places the box shaped objects on other inconspicuous
locations on the ship.
– Onboard Pacific Trader an explosion engulfs the bow of the ships sending flames into the
dark air.
– Immediately, the ship’s engines roll to a stop as the navigation and ship’s control system
computers go
into a reboot cycle.
– Ransom was requested!
Cyber Security News ⇒ Shipping
• Navigation Systems
• GPS spoofing
• Modifying GPS coordinates of one of the four satellites
• Resulting to change of the course
• GPS jamming
• Disabling navigation and communications with the outside world
Cyber Security News ⇒ Shipping
• Communication Systems
• On board
• Entertainment channel
• Business channel
• Head quarters to/from ship
• Satellite Phones
• Two main standard encryption algorithms known as GMR-1 and GMR-2 have been attacked
(2012)
• Mobile phones
• Stealing, malware, phishing
• Business channel via WWW (because of the automation, smart ships)
• Interception, interruption

More Related Content

Similar to Crontab Cyber Security session 1

Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
kkkseld
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной Кореи
Positive Hack Days
 

Similar to Crontab Cyber Security session 1 (20)

Drone delivery project proposal
Drone delivery project proposalDrone delivery project proposal
Drone delivery project proposal
 
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in Space
 
Global cybersecurity on earth + in space
Global cybersecurity on earth + in spaceGlobal cybersecurity on earth + in space
Global cybersecurity on earth + in space
 
technical disaster
technical disastertechnical disaster
technical disaster
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
Stork Overview
Stork OverviewStork Overview
Stork Overview
 
Layer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security ToolLayer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security Tool
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
 
The Pegasus Mission - The Making of Pegasus II
The Pegasus Mission - The Making of Pegasus IIThe Pegasus Mission - The Making of Pegasus II
The Pegasus Mission - The Making of Pegasus II
 
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной Кореи
 
lecture5.pptx
lecture5.pptxlecture5.pptx
lecture5.pptx
 
EENA 2016 - Drones deployments (1/3)
EENA 2016 - Drones deployments (1/3)EENA 2016 - Drones deployments (1/3)
EENA 2016 - Drones deployments (1/3)
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 

More from gpioa (12)

Lesson8
Lesson8Lesson8
Lesson8
 
Lesson7
Lesson7Lesson7
Lesson7
 
Lesson6
Lesson6Lesson6
Lesson6
 
Lesson5
Lesson5Lesson5
Lesson5
 
Lesson4
Lesson4Lesson4
Lesson4
 
Lesson3
Lesson3Lesson3
Lesson3
 
Lesson2
Lesson2Lesson2
Lesson2
 
Lesson1
Lesson1Lesson1
Lesson1
 
Lesson0
Lesson0Lesson0
Lesson0
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
Crontab Cyber Security session 2
Crontab Cyber Security session 2Crontab Cyber Security session 2
Crontab Cyber Security session 2
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS Publications
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 

Crontab Cyber Security session 1

  • 1. Cyber Security Awareness Course 1 GEORGE PAPAIOANNOU crontab Cyber Security George.papaioannou@crontab.eu
  • 3. Shipping Industry • Three main areas vulnerable to cyber security attacks • Automation & Control Systems • Navigation Systems • Communications Systems
  • 4. Cyber Security News ⇒ Shipping • Automation & Control Systems: (Real Story, 2015) – A hacker was contracted via Dark Web to gain access to control or navigation systems onboard vessels operated by the Trans-Pacific Shipping Line. – A Russian hacker gained access to a crewmember’s outdated and unpatched computer onboard the Pacific Trader (IMO: 9406922) – A tool was installed which reboots the computer used in the automation and control system of the ship. – Hacker determines that Pacific Trader is likely headed into port in Hong Kong and he is posting a message in a different private dark web chatroom.
  • 5. Cyber Security News ⇒ Shipping • Automation & Control Systems: (Real Story, 2015) – On a rooftop in Hong Kong, a young college student pulls an aerial drone out of her backpack. – Using the cover of darkness she lands the drone on the top of the pilot house and releases explosives in a box. – Repeating this process twice more, she places the box shaped objects on other inconspicuous locations on the ship. – Onboard Pacific Trader an explosion engulfs the bow of the ships sending flames into the dark air. – Immediately, the ship’s engines roll to a stop as the navigation and ship’s control system computers go into a reboot cycle. – Ransom was requested!
  • 6. Cyber Security News ⇒ Shipping • Navigation Systems • GPS spoofing • Modifying GPS coordinates of one of the four satellites • Resulting to change of the course • GPS jamming • Disabling navigation and communications with the outside world
  • 7. Cyber Security News ⇒ Shipping • Communication Systems • On board • Entertainment channel • Business channel • Head quarters to/from ship • Satellite Phones • Two main standard encryption algorithms known as GMR-1 and GMR-2 have been attacked (2012) • Mobile phones • Stealing, malware, phishing • Business channel via WWW (because of the automation, smart ships) • Interception, interruption

Editor's Notes

  1. At a minimum, four satellites must be in view of the receiver for it to compute four unknown quantities (three position coordinates and clock deviation from satellite time).