1. Output in ICT
(Final)
Submitted to:
Mrs. Carlyn T.
Nalagay
Submitted by:
Joshua Mediavilla
Robert john Taliseo
Bon Marfil
Jay Jay Encio
James Roy Duga
Kent Jackson Gayoma
Harrold Fritz Antonio
Judel Varona
Angelito Caldito
Ralph Tutica
BSMT 1-2
Group 1
3. Ships used cybersecurity precautions to avert attacks.
The constant advancement of technology necessitates the
frequent updating of cybersecurity measures onboard ships.
Cyber Security Threats
In the Ship’s Computer network
4. Data breaches, ransomware events, virus infection, and
invoicing fraud are the most typical types
of cyber assaults. It is now essential
to safeguard the data on the ship’s
servers from these attacks.
5. The following are examples of cyber attack:
Malware- designed to damage a computer system.
Phishing- uses messages to hack your system.
Water Holing- fake website, collects users information.
6. Social Engineering- influences users to give information.
Brute Force- Criminals systematically guess your
password.
Denial of Service- prevents users from accessing.
7. Spear-phishing- related to phishing, except it
aims to a person or a company.
Subverting the Supply Chain- cybercriminals will attempt
to compromise electronic systems of a vessel.
Impersonation- impersonate an employee to gain information
and gain access to your vessels system.
8. These techniques are
continually evolving it’s important to know how
to recognize the attempts to break into
your systems by being able to identify
when something is out of the ordinary.
9. Mitigation of Threats
In the Ship’s Computer network
Refers to the actions taken to reduce
or minimize the impact of potential dangers
or risks that a ship may face.
10. 1. Install and configure firewalls to monitor and
control network traffic.
2. Implement Intrusion Detection and Prevention Systems
(IDPS) to detect and prevent any unauthorized access.
3. Keep software, operating systems, and firmware up
to date with the latest security patches.
here are key mitigation strategies for ensuring the
security of a ship’s computer network:
11. 4. Implement strong user access controls and consider
multi-factor authentication.
5. Divide the network into separate segments or
VLANs to limit the impact of breach.
6. Deploy network monitoring tools to detect and
respond to any suspicious activities are found.
12. 7. Encrypt sensitive data at rest and in transit.
8. Regularly back up critical data to mitigate
the impact of data loss in systems.
9. Provide regular security awareness training to crew
members and staff to avoid any issues.
10. Develop and regularly update incident response plan.
13. It is important to consult
with cybersecurity professionals and follow industry best
practices to ensure the effectiveness of these
mitigation measures.
14. Vulnerable Points
In the Ship’s Computer network
In the maritime industry, ship computer networks
can be susceptible to cyber threats due
to their unique characteristics. Let’s explore some
of the vulnerable points in a ship’s
computer network.
15. Cargo Management Systems- These systems handle
loading, unloading, and management of cargo operation.
They are integrated into the ship’s electronic
data systems, making them potential targets for
cyber attacks.
16. Bridge systems- Even if your bridge system
is kept isolated from other networks, it
can still be vulnerable.
17. Propulsion or machinery management- Vulnerability
here will
vary with the level of interaction with
other systems, such as remote condition-based
monitoring and/or navigation and communications
equipment.
18. Navigation or Communication Systems- Vulnerabilities
in these systems can lead to serious
consequences, such as ship collisions or groundings.
20. Access control systems- Such systems, which
include surveillance equipment, and shipboard security alarms
can be vulnerable to a cyber incident.
21. Crew Devices and Personal Networks- These devices can
introduce vulnerabilities if is not adequately protected.
It is important to know the vulnerabilities
to avoid any issues or circumstances occur.
22. Supply Chain and Third-Party Systems- Ensuring the
security of these interactions is crucial to prevent
unauthorized
access or data breaches in ship’s network
system.