Welcome
About
News
Anonymous Reporting
Tools
MCA Chatter
Library
V-ID Terminal
Support
My Account

News

Icon representing US Coast Guard Bulletin: Cyber Adversaries Targeting Commercial Vessels
US Coast Guard Bulletin: Cyber Adversaries Targeting Commercial Vessels

June 21st 2019
Icon representing Would you pay $1m for a laptop full of malware?
Would you pay $1m for a laptop full of malware?

May 23rd 2019
Icon representing Singapore Opens Maritime Cybersecurity Operations Centre (MSOC)
Singapore Opens Maritime Cybersecurity Operations Centre (MSOC)

May 22nd 2019
 
 
 

Cyber ​​Security and critical infrastructures

 
January 26th 2018
The exponential increase in the digitization of business processes and the need for an ever-increasing level of collaboration - sharing - networking of production methods, associated with globalization and the "marketing" of Cyber ​​Crime, has in fact led to an explosion of accidents information technology and targeted attacks on the informational capital of companies that, until thirty years ago, were not even imaginable.

The development of new technologies ( Internet of Things, mobile Apps , etc.) is increasing the number of physical objects connected to the Internet and a greater risk of "permeability" of the company perimeters. The more objects and information we have connected, the more devices to be controlled, the more intense the impact will be in the event of an accident or attack. The increase in dependence on the Cyber ​​Space , on the one hand, offers new opportunities, on the other it introduces new threats. The advantages offered by increasingly open national and transnational markets clash with the increased vulnerability of the IT systems that such openness entails.

Information technology will be increasingly central even in the development plans of collective integrated mobility, especially in large metropolitan areas. Thanks to artificial intelligence, critical infrastructures, such as the transport sector, can be exploited more effectively and efficiently. In using the services offered by the transport sector, we do not realize that the problem of cyber security is still present and is of fundamental importance.

The air transport industry, strongly interconnected at the IT level, is constantly looking for greater efficiency thanks to cloud services , which allow cost containment and improvement of the flight experience. These investments in IT, however, have a critical aspect: if not systematically monitoring and based on a preventive Cyber ​​Security can lend their side to hackers. Computer attacks, even for terrorist purposes, can lead to the theft of confidential and confidential information, but also the blocking of essential services and collective mobility.

Maritime transport is not immune to cyber attacks. Cyber ​​threats to ships and their goods are, indeed, one of the emerging risks and potentially destined to have a greater impact because the maritime industry is increasingly dependent on interconnected IT systems. Threats can result from an inappropriate integration and interaction between IT systems or their updates or from attacks from external sources. To respond to this threat, an industrial joint venture has recently been created (made up of several companies in the sector such as Bimco, Ocimf, Iumi, Clia, Ics, Intercargo and Intertanko), which has developed guidelines on Cyber ​​Security on board ships. Among the advice provided by the Maritime Cyber ​​Risk Managementwhat stands out is that it has a team of experts, which could greatly speed up the recovery of the systems in the event of cybernetic attacks, allowing them to return to their normal operation as quickly as possible.

In the rail transport sector, artificial intelligence is also a strategic priority. With big data and advanced analysis systems, customers will have access to digital tools for a modern, dynamic and functional travel experience to suit their needs, where mobility choices can be made in real time and based on the best conditions proposed. However, if cyberattacks were the first to create problems at the ticket reservation system, now, the more we go towards the digitalization of systems, the more delicate it becomes.

Finally, each car generation incorporates new intelligent technologies for remote diagnostics, autonomous driving, remote driver assistance and infotainment that can be put at risk by cyber attacks The risks of hacker attacks are numerous even for connected cars as the apps could be violated allowing hackers to take control of the car's server. This and other weaknesses have stimulated famous automotive companies to take important measures for Cyber ​​Security, "Stressing" the computer systems to identify any flaws and immediately remedy them. This is how hackers join forces with engineers, joining forces to find solutions to the weak points of these connected cars and to prevent risks associated with possible attacks by outsiders.

IT security should not therefore be considered as a superfluous expense but an indispensable pre-condition for the company, which can become an element of competitive differentiation. The spread of a culture of information security is a decisive factor not only in a defensive way, but above all in terms of economic growth. It is essential to consolidate a true culture of IT risk management. Only through this growth will the effective implementation of a public / private system be possible to raise the level of IT security in the country.

Source

Keywords