The shipping industry is vulnerable to hackers, as cargo ships begin to use more and more connected devices and automated systems while traversing the open seas. These cyber security loopholes could be exploited to make a freighters' cargo an easy target for teams of pirates and cyber criminals.
According to a report by Reuters, hackers have already deployed cyber attacks in order disrupt ports and the ships docked within them for purposes ranging from disabling vessels by filling networks with malware, or infiltrating systems to target specific docked cargo to steal. There are also reports that hackers have shut down a floating oil rig by breaking into its systems and causing it to tilt at an angle, making it unable to continue operating.
As ships run with smaller crews and more automated systems, the fear is that they could become vulnerable to attack while sailing across the globe, with with criminals able to take advantage of them in isolated international waters.
Researchers have previously demonstrated how it's possible for hackers to use techniques such as disrupting GPS signals to force a ship to change course, which could leave the containers dangerously exposed to the threats posed by pirates.
While there's not yet much evidence that ships - still used to transport 90 per cent of the world's cargo - are regular victims of cyber attacks, there are concerns that there will soon be a rush of hackers ready to exploit vulnerable systems.
Those fears are compounded by the suspicion that shipping firms often don't report known cases for rear of causing alarm to investors and insurers. And in many cases they don't know they're being attacked at all.
Wil Rockall, director of KPMG's cyber security team, believes shipping could be particularly vulnerable because IT and cyber security systems in the industry haven't developed as quickly as those in other sectors.
"Most ports and terminals are managed by industrial control systems which have, until very recently, been left out of the CIO's scope. Historically, this security has not been managed by company CISOs and maritime control systems are very similar," Rockhall said.
[Please turn to page 2]
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)