<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Risk-Analysis - Tag - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/tags/risk-analysis/</link><description>Risk-Analysis - Tag - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Mon, 20 Apr 2020 14:44:21 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/tags/risk-analysis/" rel="self" type="application/rss+xml"/><item><title>Cyber threats in the maritime sector: have all scenarios really been considered?</title><link>https://maritimeinfosec.org/cyber-threats-in-the-maritime-sector-have-all-scenarios-really-been-considered/</link><pubDate>Mon, 20 Apr 2020 14:44:21 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/cyber-threats-in-the-maritime-sector-have-all-scenarios-really-been-considered/</guid><description><![CDATA[<p>The Bordeaux-based maritime insurer Adam Assurances has published a study on cyber risks affecting the maritime sector (available <a href="https://adamassur.hypotheses.org/2768" target="_blank" rel="noopener noreferrer ">here</a> as a blog article and <a href="https://f.hypotheses.org/wp-content/blogs.dir/4944/files/2020/04/Te%CC%81le%CC%81charger.pdf" target="_blank" rel="noopener noreferrer ">here</a> in PDF format).</p>
<p>After recalling the digital transformation underway across the maritime industry and the growing dependency that accompanies it, the insurer reviews several cyber incidents that have already affected the sector (MSC, COSCO, Maersk, among others).</p>
<p>Building on the key findings of the CyRiM study (see <a href="/according-to-lloyds-a-cyberattack-on-asian-ports-could-cost-110-billion/" rel="">this article from November 2019 discussing it</a>, the report then examines the Shen Attack scenario described in that analysis. Applied to the maritime sector, the scenario estimates that a large-scale cyberattack could impact up to 15 ports in Asia.</p>]]></description></item><item><title>Major risk scenarios affecting maritime information systems</title><link>https://maritimeinfosec.org/major-risk-scenarios-affecting-maritime-information-systems/</link><pubDate>Mon, 28 Oct 2019 21:37:33 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/major-risk-scenarios-affecting-maritime-information-systems/</guid><description><![CDATA[<p>Even a brief and high-level risk analysis makes it possible to identify several major risk scenarios that could affect the maritime sector. The list below is not exhaustive, but it provides an overview of some of the most relevant concerns.</p>
<p>For vessels, these scenarios may include:</p>
<ul>
<li>attempts to spoof or jam positioning or communication systems, either directly targeting the vessel or affecting its surrounding environment</li>
<li>malfunctions or loss of availability of ECDIS navigation systems, even though these systems are often deployed with redundancy</li>
<li>the transmission of false safety information to vessels (GMDSS alerts, AIS data, weather information, etc.)</li>
<li>intrusions targeting onboard industrial control systems, including propulsion, navigation, or cargo management systems</li>
<li>the remote takeover of a vessel or part of its systems</li>
<li>the partial or complete encryption of onboard information systems through ransomware attacks</li>
</ul>
<p>Ports are also exposed to similar risks, including:</p>]]></description></item><item><title>Threat sources targeting the maritime sector</title><link>https://maritimeinfosec.org/threat-sources-targeting-the-maritime-sector/</link><pubDate>Wed, 24 Oct 2018 19:11:09 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/threat-sources-targeting-the-maritime-sector/</guid><description><![CDATA[<p>Who might want to target maritime information systems?</p>
<p>Intentional threat sources are broadly similar to those encountered in other sectors. Rather than reproducing a long and exhaustive list of possible threat actors, it is worth noting that the French cybersecurity agency ANSSI has already documented them in detail (see p. 15 and following pages in the reference below).</p>
<p>Today, the most realistic threat sources include:</p>
<ul>
<li>state-sponsored actors, pursuing objectives such as espionage, pre-positioning within systems, or even disruption and destruction</li>
<li>&ldquo;casual&rdquo; hackers, inspired by demonstrations or proof-of-concept attacks presented at cybersecurity conferences and attempting to reproduce them</li>
<li>competitors, a possibility that cannot be completely ruled out and should at least be considered in risk assessments</li>
<li>terrorist or piracy-related organizations, which could see financial or strategic value in such attacks</li>
<li>collateral infections, meaning attacks that do not specifically target the maritime sector but still affect it, as is often the case with ransomware campaigns</li>
</ul>
<p>It is worth remembering that cyber operations have several advantages for attackers: they can often be carried out anonymously, attribution is difficult, and attacks can be launched rapidly and at relatively low cost (especially when the attacker only needs to deploy existing tools).</p>]]></description></item></channel></rss>