Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the
Shipping Industry
- URL: http://arxiv.org/abs/2208.03607v1
- Date: Sun, 7 Aug 2022 00:49:36 GMT
- Title: Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the
Shipping Industry
- Authors: George Grispos and William R. Mahoney
- Abstract summary: Maritime shipping has become a trillion-dollar industry that now impacts the economy of virtually every country around the world.
The implementation of these technologies has also caught the attention of cybercriminals.
This paper describes cybersecurity vulnerabilities present in the international shipping business.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Maritime shipping has become a trillion-dollar industry that now impacts the
economy of virtually every country around the world. It is therefore no
surprise that countries and companies have spent billions of dollars to
modernize shipping vessels and ports with various technologies. However, the
implementation of these technologies has also caught the attention of
cybercriminals. For example, a cyberattack on one shipping company resulted in
nearly $300 millions in financial losses. Hence, this paper describes
cybersecurity vulnerabilities present in the international shipping business.
The contribution of this paper is the identification and dissection of cyber
vulnerabilities specific to the shipping industry, along with how and why these
potential vulnerabilities exist.
Related papers
- Maritime Cybersecurity: A Comprehensive Review [8.406766604243163]
Maritime cybersecurity refers to the protection of computer systems and digital assests within the maritime industry.
In this survey, we aim to identify the significant domains of maritime cybersecurity and measure their effectiveness.
A multi-dimensional taxonomy of maritime cyber attacks is presented, offering insights into threat actors, motivations, and impacts.
We have evaluated various security solutions, from integrated solutions to component specific solutions.
arXiv Detail & Related papers (2024-09-09T07:30:48Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Global Pandemics Influence on Cyber Security and Cyber Crimes [5.8010446129208155]
COVID-19 has caused widespread damage across many areas of life and has made humans more dependent on the internet and technology.
This paper examines the different types of security threats and cyber crimes that people faced in the pandemic time and the need for a safe and secure cyber infrastructure.
arXiv Detail & Related papers (2023-02-24T05:26:42Z) - Defending against cybersecurity threats to the payments and banking
system [0.0]
The proliferation of cyber crimes is a huge concern for various stakeholders in the banking sector.
To prevent risks of cyber-attacks on software systems, entities operating within cyberspace must be identified.
This paper will examine various approaches that identify assets in cyberspace, classify the cyber threats, provide security defenses and map security measures to control types and functionalities.
arXiv Detail & Related papers (2022-12-15T11:55:11Z) - Artificial Intelligence for Cybersecurity: Threats, Attacks and
Mitigation [1.80476943513092]
The surging menace of cyber-attacks got a jolt from the recent advancements in Artificial Intelligence.
The intervention of AI not only automates a particular task but also improves efficiency by many folds.
This article discusses cybersecurity and cyber threats along with both conventional and intelligent ways of defense against cyber-attacks.
arXiv Detail & Related papers (2022-09-27T15:20:23Z) - Hyperloop: A Cybersecurity Perspective [56.82349944873289]
We provide the first analysis of the cybersecurity challenges of the interconnections between the different components of the Hyperloop ecosystem.
We investigate possible infrastructure management approaches and their security concerns.
We discuss countermeasures and future directions for the security of the Hyperloop design.
arXiv Detail & Related papers (2022-09-07T12:10:36Z) - Future Computer Systems and Networking Research in the Netherlands: A
Manifesto [137.47124933818066]
We draw attention to CompSys as a vital part of ICT.
Each of the Top Sectors of the Dutch Economy, each route in the National Research Agenda, and each of the UN Sustainable Development Goals pose challenges that cannot be addressed without CompSys advances.
arXiv Detail & Related papers (2022-05-26T11:02:29Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - A Review on Cyber Crimes on the Internet of Things [4.207621961895129]
The global cybercrime damages predicted to cost up to 6 trillion dollars annually on the global economy by cyber crime.
The reasons for cyber-attacks can be Countries having week cyber securities, Cybercriminals use new technologies to attack.
MSP (Managed Service Providers) face different difficulties in fighting with Cyber-crime.
arXiv Detail & Related papers (2020-09-12T02:56:59Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.