scholarly journals The Future of Shipping: Presence of Cyber Attacks in Maritime Industries

Khazanah ◽  
2020 ◽  
Vol 12 (2) ◽  
Author(s):  
Muhammad Dihan Ramadhan Pradana ◽  

During the pandemic, many activities are starting to take place online. Consumers are now forced to interact with their gadget. In order to increase efficiency, many logistic-related industries started to implement an online communication, payment and tracking system. Indonesia is currently the largest archipelagic state in the world. With around 77% of total area consists of water, the flow of economics in each region depends on the existence of sufficient fleet of marine transportation. Indonesian President Joko Widodo has implemented the ‘Tol Laut’ program in 2015 in order to reduce price disparity in Indonesia. Tol Laut has proven itself by reducing up to 20% of cost in Eastern Indonesia. Online database system might reduce cost and bringing the industries into a more intimate relation with their customers. On the other hand, it could increase the risk of cyberattack. AP Moller-Maersk has experienced this kind of threat when their IT systems are completely shut down in 2017. This paper will evaluate factors affecting the number of cyber attacks in maritime industries based on survey and interviews with the stakeholders and analyze key steps in mitigating and restoring IT systems. Common mistakes made by industries that could increase the risk of being attacked are as follows: human error, misconfigured firewall, error in protocol manipulation, and error in programs. There are recommendation to mitigate cyberthreat from re-occuring in the future: software and antivirus upgrade, use of privileged administrator, remote access permission, data disposal and onshore support. Taking effective response is also compulsory to decide which IT/OT system must be kept running or shut down, whether certain ship communication that links with shore should be shut down, appropriate use of any advanced tools provided in pre- installed security software, and understanding whether the incident has compromised the IT/OT system beyond capabilities of recovery.

2017 ◽  
Vol 12 ◽  
pp. 104
Author(s):  
Petra Skolilova

The article outlines some human factors affecting the operation and safety of passenger air transport given the massive increase in the use of the VLA. Decrease of the impact of the CO2 world emissions is one of the key goals for the new aircraft design. The main wave is going to reduce the burned fuel. Therefore, the eco-efficiency engines combined with reasonable economic operation of the aircraft are very important from an aviation perspective. The prediction for the year 2030 says that about 90% of people, which will use long-haul flights to fly between big cities. So, the A380 was designed exactly for this time period, with a focus on the right capacity, right operating cost and right fuel burn per seat. There is no aircraft today with better fuel burn combined with eco-efficiency per seat, than the A380. The very large aircrafts (VLAs) are the future of the commercial passenger aviation. Operating cost versus safety or CO2 emissions versus increasing automation inside the new generation aircraft. Almost 80% of the world aircraft accidents are caused by human error based on wrong action, reaction or final decision of pilots, the catastrophic failures of aircraft systems, or air traffic control errors are not so frequent. So, we are at the beginning of a new age in passenger aviation and the role of the human factor is more important than ever.


2014 ◽  
Author(s):  
Florian-Cosmin BUTOI

A particularly dangerous and now common type of spam known as "Phishing” attempts to trick recipients into revealing personal and sensitive data, such as passwords, login ID’s, financial information or social security numbers. Recipients are directed to counterfeit and fraudulent websites that are exact duplicates of well-known and respected companies such as eBay, PayPal or large banking institutions and prompted to enter account information. This white paper addresses current issues associated with phishing scams and argues the most probable and likely direction phishing scams will follow in the future. Recommended safe user guidelines are included to help protect users from both current and future phishing attacks.


Author(s):  
Fash Safdari

Remote Framebuffer (RFB) protocol is a simple protocol for remote access to graphical user interfaces. The use of the RFB protocol has been developed as a means of streaming content, alleviating much of the processing requirements of games for the end user. Cloud gaming is currently an area of the gaming industry gaining large amounts of ground with respect to the potential viability in the future. Understanding how QoS can affect the development of cloud gaming, as well as the metrics involved, and how these metrics affect areas surrounding QoE could help aid developments in cloud gaming as an extremely viable process in the future.


1990 ◽  
Vol 27 (03) ◽  
pp. 129-152
Author(s):  
Alexander C. Landsburg ◽  
Eric Gabler ◽  
George Levine ◽  
Richard Sonnenschein ◽  
Earl Simmons

Foreign "ship of the future" research programs, recent design work, and other studies are the background for this paper, which addresses the interaction between innovation and competitiveness; trends in economics; advances in technology; effective manning; social needs; and design constraints. The paper then provides a discussion of attractive innovations and avenues toward U.S. competitiveness in the maritime industries of tomorrow.


Author(s):  
Maurice Dawson ◽  
Jorja Wright ◽  
Marwan Omar

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.


Author(s):  
Joshua Crumbaugh

Human error is the cause of over 95% of data breaches and the weakest aspect of cybersecurity in nearly all organizations. These errors guarantee that hackers can easily gain access to almost any network in the world and take complete control of systems, data, and more. This chapter outlines the top mistakes organizations make in security awareness and why most companies are failing to properly prepare their users for cyber-attacks. Each point is accompanied by actionable data derived from real-world training program successes and failures.


2019 ◽  
pp. 1482-1499 ◽  
Author(s):  
Leanne Hirshfield ◽  
Philip Bobko ◽  
Alex J. Barelka ◽  
Mark R. Costa ◽  
Gregory J. Funke ◽  
...  

Despite the importance that human error in the cyber domain has had in recent reports, cyber warfare research to date has largely focused on the effects of cyber attacks on the target computer system. In contrast, there is little empirical work on the role of human operators during cyber breaches. More specifically, there is a need to understand the human-level factors at play when attacks occur. This paper views cyber attacks through the lens of suspicion, a construct that has been used in other contexts, but inadequately defined, in prior research. After defining the construct of suspicion, the authors demonstrate the role that suspicion plays as the conduit between computer operators' normal working behaviors and their ability to alter that behavior to detect and react to cyber attacks. With a focus on the user, rather than the target computer, the authors empirically develop a latent structure for a variety of types of cyber attacks, link that structure to levels of operator suspicion, link suspicion to users' cognitive and emotional states, and develop initial implications for cyber training.


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


Author(s):  
Kim J. Vicente

Following the theme for this year's conference, this paper contributes to ongoing discussions defining the future of cognitive engineering research by examining a part of its past. The history of one particular line of research, that of the Electronics Department at Risø National Laboratory, is reviewed. A number of important studies, conducted between 1962 and 1979, are briefly described. Among these are operational experience acquired from the introduction of a prototype digital console in a nuclear research reactor, two field studies of professional operators conducting representative tasks in representative settings (electronic trouble-shooting and conventional power plant control), and analyses of over 645 human error reports in the nuclear and aviation industries. Some of the themes characterizing the Risø research program in cognitive engineering are briefly summarized. These themes help define what cognitive engineering is, and what it might be concerned with in the future.


Author(s):  
Neil C. Rowe ◽  
E. John Custy

Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and several other forms of deception. We then speculate on the directions in which cyber attacks may evolve in the future.


Sign in / Sign up

Export Citation Format

Share Document