SlideShare a Scribd company logo
1 of 23
Output in ICT
(Final)
Submitted to:
Mrs. Carlyn T.
Nalagay
Submitted by:
Joshua Mediavilla
Robert john Taliseo
Bon Marfil
Jay Jay Encio
James Roy Duga
Kent Jackson Gayoma
Harrold Fritz Antonio
Judel Varona
Angelito Caldito
Ralph Tutica
BSMT 1-2
Group 1
TOPIC:
Cyber Security Threats
Mitigation of Threats
Vulnerable Points
In the Ship’s Computer network
Ships used cybersecurity precautions to avert attacks.
The constant advancement of technology necessitates the
frequent updating of cybersecurity measures onboard ships.
Cyber Security Threats
In the Ship’s Computer network
Data breaches, ransomware events, virus infection, and
invoicing fraud are the most typical types
of cyber assaults. It is now essential
to safeguard the data on the ship’s
servers from these attacks.
The following are examples of cyber attack:
Malware- designed to damage a computer system.
Phishing- uses messages to hack your system.
Water Holing- fake website, collects users information.
Social Engineering- influences users to give information.
Brute Force- Criminals systematically guess your
password.
Denial of Service- prevents users from accessing.
Spear-phishing- related to phishing, except it
aims to a person or a company.
Subverting the Supply Chain- cybercriminals will attempt
to compromise electronic systems of a vessel.
Impersonation- impersonate an employee to gain information
and gain access to your vessels system.
These techniques are
continually evolving it’s important to know how
to recognize the attempts to break into
your systems by being able to identify
when something is out of the ordinary.
Mitigation of Threats
In the Ship’s Computer network
Refers to the actions taken to reduce
or minimize the impact of potential dangers
or risks that a ship may face.
1. Install and configure firewalls to monitor and
control network traffic.
2. Implement Intrusion Detection and Prevention Systems
(IDPS) to detect and prevent any unauthorized access.
3. Keep software, operating systems, and firmware up
to date with the latest security patches.
here are key mitigation strategies for ensuring the
security of a ship’s computer network:
4. Implement strong user access controls and consider
multi-factor authentication.
5. Divide the network into separate segments or
VLANs to limit the impact of breach.
6. Deploy network monitoring tools to detect and
respond to any suspicious activities are found.
7. Encrypt sensitive data at rest and in transit.
8. Regularly back up critical data to mitigate
the impact of data loss in systems.
9. Provide regular security awareness training to crew
members and staff to avoid any issues.
10. Develop and regularly update incident response plan.
It is important to consult
with cybersecurity professionals and follow industry best
practices to ensure the effectiveness of these
mitigation measures.
Vulnerable Points
In the Ship’s Computer network
In the maritime industry, ship computer networks
can be susceptible to cyber threats due
to their unique characteristics. Let’s explore some
of the vulnerable points in a ship’s
computer network.
Cargo Management Systems- These systems handle
loading, unloading, and management of cargo operation.
They are integrated into the ship’s electronic
data systems, making them potential targets for
cyber attacks.
Bridge systems- Even if your bridge system
is kept isolated from other networks, it
can still be vulnerable.
Propulsion or machinery management- Vulnerability
here will
vary with the level of interaction with
other systems, such as remote condition-based
monitoring and/or navigation and communications
equipment.
Navigation or Communication Systems- Vulnerabilities
in these systems can lead to serious
consequences, such as ship collisions or groundings.
Satellite Communication Systems- These systems are
potential targets for cyber-attacks, affecting ship
operations and safety.
Access control systems- Such systems, which
include surveillance equipment, and shipboard security alarms
can be vulnerable to a cyber incident.
Crew Devices and Personal Networks- These devices can
introduce vulnerabilities if is not adequately protected.
It is important to know the vulnerabilities
to avoid any issues or circumstances occur.
Supply Chain and Third-Party Systems- Ensuring the
security of these interactions is crucial to prevent
unauthorized
access or data breaches in ship’s network
system.
THANK YOU

More Related Content

Similar to Information and Communication technology

Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
jeanettehully
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
todd521
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
isidro luna beltran
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 

Similar to Information and Communication technology (20)

Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
PACE-IT: Common Threats (part 1)
PACE-IT: Common Threats (part 1)PACE-IT: Common Threats (part 1)
PACE-IT: Common Threats (part 1)
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Information and Communication technology

  • 1. Output in ICT (Final) Submitted to: Mrs. Carlyn T. Nalagay Submitted by: Joshua Mediavilla Robert john Taliseo Bon Marfil Jay Jay Encio James Roy Duga Kent Jackson Gayoma Harrold Fritz Antonio Judel Varona Angelito Caldito Ralph Tutica BSMT 1-2 Group 1
  • 2. TOPIC: Cyber Security Threats Mitigation of Threats Vulnerable Points In the Ship’s Computer network
  • 3. Ships used cybersecurity precautions to avert attacks. The constant advancement of technology necessitates the frequent updating of cybersecurity measures onboard ships. Cyber Security Threats In the Ship’s Computer network
  • 4. Data breaches, ransomware events, virus infection, and invoicing fraud are the most typical types of cyber assaults. It is now essential to safeguard the data on the ship’s servers from these attacks.
  • 5. The following are examples of cyber attack: Malware- designed to damage a computer system. Phishing- uses messages to hack your system. Water Holing- fake website, collects users information.
  • 6. Social Engineering- influences users to give information. Brute Force- Criminals systematically guess your password. Denial of Service- prevents users from accessing.
  • 7. Spear-phishing- related to phishing, except it aims to a person or a company. Subverting the Supply Chain- cybercriminals will attempt to compromise electronic systems of a vessel. Impersonation- impersonate an employee to gain information and gain access to your vessels system.
  • 8. These techniques are continually evolving it’s important to know how to recognize the attempts to break into your systems by being able to identify when something is out of the ordinary.
  • 9. Mitigation of Threats In the Ship’s Computer network Refers to the actions taken to reduce or minimize the impact of potential dangers or risks that a ship may face.
  • 10. 1. Install and configure firewalls to monitor and control network traffic. 2. Implement Intrusion Detection and Prevention Systems (IDPS) to detect and prevent any unauthorized access. 3. Keep software, operating systems, and firmware up to date with the latest security patches. here are key mitigation strategies for ensuring the security of a ship’s computer network:
  • 11. 4. Implement strong user access controls and consider multi-factor authentication. 5. Divide the network into separate segments or VLANs to limit the impact of breach. 6. Deploy network monitoring tools to detect and respond to any suspicious activities are found.
  • 12. 7. Encrypt sensitive data at rest and in transit. 8. Regularly back up critical data to mitigate the impact of data loss in systems. 9. Provide regular security awareness training to crew members and staff to avoid any issues. 10. Develop and regularly update incident response plan.
  • 13. It is important to consult with cybersecurity professionals and follow industry best practices to ensure the effectiveness of these mitigation measures.
  • 14. Vulnerable Points In the Ship’s Computer network In the maritime industry, ship computer networks can be susceptible to cyber threats due to their unique characteristics. Let’s explore some of the vulnerable points in a ship’s computer network.
  • 15. Cargo Management Systems- These systems handle loading, unloading, and management of cargo operation. They are integrated into the ship’s electronic data systems, making them potential targets for cyber attacks.
  • 16. Bridge systems- Even if your bridge system is kept isolated from other networks, it can still be vulnerable.
  • 17. Propulsion or machinery management- Vulnerability here will vary with the level of interaction with other systems, such as remote condition-based monitoring and/or navigation and communications equipment.
  • 18. Navigation or Communication Systems- Vulnerabilities in these systems can lead to serious consequences, such as ship collisions or groundings.
  • 19. Satellite Communication Systems- These systems are potential targets for cyber-attacks, affecting ship operations and safety.
  • 20. Access control systems- Such systems, which include surveillance equipment, and shipboard security alarms can be vulnerable to a cyber incident.
  • 21. Crew Devices and Personal Networks- These devices can introduce vulnerabilities if is not adequately protected. It is important to know the vulnerabilities to avoid any issues or circumstances occur.
  • 22. Supply Chain and Third-Party Systems- Ensuring the security of these interactions is crucial to prevent unauthorized access or data breaches in ship’s network system.