<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Threats - Tag - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/tags/threats/</link><description>Threats - Tag - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Fri, 14 Dec 2018 10:30:26 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/tags/threats/" rel="self" type="application/rss+xml"/><item><title>Release of the 3rd edition of the cybersecurity best practices guide for the maritime industry</title><link>https://maritimeinfosec.org/release-of-the-3rd-edition-of-the-cybersecurity-best-practices-guide-for-the-maritime-industry/</link><pubDate>Fri, 14 Dec 2018 10:30:26 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/release-of-the-3rd-edition-of-the-cybersecurity-best-practices-guide-for-the-maritime-industry/</guid><description><![CDATA[<p>There are many recommendation guides for implementing cybersecurity measures in the maritime sector. Perhaps too many, and of uneven quality, which can sometimes make things difficult to navigate (put yourself in the shoes of the seafarer or the shipowner who must understand and apply them).</p>
<p>Among these guides, one nevertheless stands out as a reference, both because of the number of associations and major industry stakeholders involved in its development (21 in total) and because it addresses the maritime world in its own terms, adapting cyber threats to the specific characteristics of this sector. This guide, <strong>“The Guidelines on Cyber Security Onboard Ships,”</strong> <a href="http://www.ics-shipping.org/docs/default-source/resources/safety-security-and-operations/guidelines-on-cyber-security-onboard-ships.pdf" target="_blank" rel="noopener noreferrer ">has just been released in its third edition</a>.</p>]]></description></item><item><title>Threat sources targeting the maritime sector</title><link>https://maritimeinfosec.org/threat-sources-targeting-the-maritime-sector/</link><pubDate>Wed, 24 Oct 2018 19:11:09 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/threat-sources-targeting-the-maritime-sector/</guid><description><![CDATA[<p>Who might want to target maritime information systems?</p>
<p>Intentional threat sources are broadly similar to those encountered in other sectors. Rather than reproducing a long and exhaustive list of possible threat actors, it is worth noting that the French cybersecurity agency ANSSI has already documented them in detail (see p. 15 and following pages in the reference below).</p>
<p>Today, the most realistic threat sources include:</p>
<ul>
<li>state-sponsored actors, pursuing objectives such as espionage, pre-positioning within systems, or even disruption and destruction</li>
<li>&ldquo;casual&rdquo; hackers, inspired by demonstrations or proof-of-concept attacks presented at cybersecurity conferences and attempting to reproduce them</li>
<li>competitors, a possibility that cannot be completely ruled out and should at least be considered in risk assessments</li>
<li>terrorist or piracy-related organizations, which could see financial or strategic value in such attacks</li>
<li>collateral infections, meaning attacks that do not specifically target the maritime sector but still affect it, as is often the case with ransomware campaigns</li>
</ul>
<p>It is worth remembering that cyber operations have several advantages for attackers: they can often be carried out anonymously, attribution is difficult, and attacks can be launched rapidly and at relatively low cost (especially when the attacker only needs to deploy existing tools).</p>]]></description></item></channel></rss>