<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Maintenance - Tag - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/tags/maintenance/</link><description>Maintenance - Tag - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Wed, 24 Oct 2018 19:11:09 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/tags/maintenance/" rel="self" type="application/rss+xml"/><item><title>Threat sources targeting the maritime sector</title><link>https://maritimeinfosec.org/threat-sources-targeting-the-maritime-sector/</link><pubDate>Wed, 24 Oct 2018 19:11:09 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/threat-sources-targeting-the-maritime-sector/</guid><description><![CDATA[<p>Who might want to target maritime information systems?</p>
<p>Intentional threat sources are broadly similar to those encountered in other sectors. Rather than reproducing a long and exhaustive list of possible threat actors, it is worth noting that the French cybersecurity agency ANSSI has already documented them in detail (see p. 15 and following pages in the reference below).</p>
<p>Today, the most realistic threat sources include:</p>
<ul>
<li>state-sponsored actors, pursuing objectives such as espionage, pre-positioning within systems, or even disruption and destruction</li>
<li>&ldquo;casual&rdquo; hackers, inspired by demonstrations or proof-of-concept attacks presented at cybersecurity conferences and attempting to reproduce them</li>
<li>competitors, a possibility that cannot be completely ruled out and should at least be considered in risk assessments</li>
<li>terrorist or piracy-related organizations, which could see financial or strategic value in such attacks</li>
<li>collateral infections, meaning attacks that do not specifically target the maritime sector but still affect it, as is often the case with ransomware campaigns</li>
</ul>
<p>It is worth remembering that cyber operations have several advantages for attackers: they can often be carried out anonymously, attribution is difficult, and attacks can be launched rapidly and at relatively low cost (especially when the attacker only needs to deploy existing tools).</p>]]></description></item></channel></rss>