Download presentation
Presentation is loading. Please wait.
Published byHoratio Clark Modified over 8 years ago
1
Maritime Cyber Security in the Commercial Cargo Control sector Justin Dunning
2
The Mission Follow the cargo through its voyage Observe all of the touch points that a container goes through Determine if those touch points are susceptible to a cyber attack Once vulnerabilities are detected, determine the following: Possibility Severity
3
Who Would Disturb the Flow? Drug Cartels Drug trade is worth $435 Billion Increased from $320 Billion in 2005 Arms Distributors Arms trade is worth between $45-60 Billion a year Thieves Can make a decent amount of money on the black market
4
Who and What are Vulnerable? RFID Tags Possibility: High No uniformity= easily counterfeited Severity: High Could contribute to drug, arms trade, and theft Freight Forwarder/3PL Possibility: High Email information is easily attackable Severity: High Contribute to high confusion in ports halting operations
5
Who and What are Vulnerable? Algorithms Possibility: Low Must be highly skilled to decrypt these Severity: High Could alter the position on the vessel Electronic Data Interchange (EDI) Possibility: Medium Makes it possible for many people to view Severity: Medium Has the potential to effect the flow of supply chain because information is not confidential to necessary personnel
6
Who and What are Vulnerable? The Ports Possibility: Low Take measures to protect but wont be 100% protected Severity: High If this happens, halting the port for numerous days would affect the local economy DDoS Attack Possibility: Low Measures put in place to protect their servers Severity: High This would shut down every port function at the same time
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.