Now Tec BlogNow Tec Blog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Poland’s PM tells Ukraine’s Zelenskyy to ‘never insult’ Polish people again | Russia-Ukraine war News

    September 23, 2023

    Science Researcher at MCG to receive $90,000 grant to fix retinopathy of prematurity

    September 23, 2023

    PolyU researcher excels in fiber science and

    September 23, 2023
    Facebook Twitter Instagram
    • Home
    • Business

      6 critical things to know about the autoworkers strike that threatens to reshape the economy, politics, and labor’s future

      September 23, 2023

      ‘I felt betrayed’: Health influencers are gaining notoriety for lies and lawsuits over deceptive marketing and claims that are too good to be true

      September 22, 2023

      Chase Ink Business Unlimited review: an easy 1.5% cash back on all purchases

      September 22, 2023

      After calamitous wildfires, California hopes to avert a collapse of its home insurance market by making rules more business friendly

      September 22, 2023

      Chase Ink Business Cash Review: 5% cash back for established businesses

      September 22, 2023
    • Gadgets

      Netflix Fall of the House of Usher Review: Exquisite Poe Tribute

      September 23, 2023

      You can find love on Tinder for $500 a month, if you qualify for its elite tier

      September 22, 2023

      iPhone 15 stuck on the Apple logo during setup? Here’s how to fix it

      September 22, 2023

      The FTC may file an antitrust lawsuit against Amazon as soon as next week

      September 22, 2023

      Bowing to pressure, Unity announces the terms of its surrender

      September 22, 2023
    • Tech

      Unity May Never Win Back the Developers It Lost in Its Fee Debacle

      September 22, 2023

      Satellite Images Show the Devastating Cost of Sudan’s Aerial War

      September 22, 2023

      ‘Majority’ Imagines Internet Hate Mobs to the Extreme

      September 22, 2023

      These scientists live like astronauts without leaving Earth

      September 22, 2023

      Inside the Race to Stop a Deadly Viral Outbreak in India

      September 22, 2023
    • World

      Poland’s PM tells Ukraine’s Zelenskyy to ‘never insult’ Polish people again | Russia-Ukraine war News

      September 23, 2023

      US auto workers expand strike as Biden prepares to join picket line | News

      September 23, 2023

      Amid canal dispute, Haitian migrants prepare to leave Dominican Republic | Border Disputes News

      September 22, 2023

      Young Chinese choose dating, staying single as marriages decline in China | Arts and Culture News

      September 22, 2023

      CIA abuse rendered 9/11 defendant unfit for trial: US military judge | September 11 News

      September 22, 2023
    • AI

      AI now bringing Jesus to your phone

      September 23, 2023

      AI could be the next tool to prevent veteran suicide

      September 22, 2023

      Leader Schumer Holds the Senate’s Inaugural AI Insight Forum — AI: The Washington Report | Mintz – Antitrust Viewpoints

      September 22, 2023

      AI Legal News Summer Roundup: Edition 5 | White & Case LLP

      September 22, 2023

      Benjamin Netanyahu talks to Elon Musk about AI cannibalizing more jobs than it creates

      September 22, 2023
    • Apple

      Best MacBook deals: 15-inch and 13-inch MacBook Airs at all-time low prices at Best Buy

      September 22, 2023

      Alexa Generative AI Update Reveal At Amazon’s Annual Device Event – Amazon.com (NASDAQ:AMZN)

      September 22, 2023

      Alexa Generative AI Update Reveal At Amazon’s Annual Device Event – Amazon.com (NASDAQ:AMZN)

      September 22, 2023

      Pay For Higher Gas Prices With These Oil Dividends

      September 22, 2023

      US Secretary of State Anthony Blinken Praises William Ruto for Promoting Democracy, Growing Economy

      September 22, 2023
    • ChatGPT

      Browse With Bing Returns To ChatGPT iPhone App With Links

      September 22, 2023

      What the Tech? Can ChatGPT help students?

      September 22, 2023

      How companies are embracing generative AI…or not

      September 22, 2023

      George R.R. Martin demanda a ChatGPT por “robo masivo”

      September 22, 2023

      ChatGPT: 17 authors sue OpenAI for copyright infringements  

      September 22, 2023
    • Cyber Security

      Bragar Eagel & Squire, P.C. Reminds Investors

      September 23, 2023

      ‘Power, influence, notoriety’: The Gen-Z hackers who struck MGM, Caesars

      September 22, 2023

      Governor Confirms A ‘Major Cyber-Attack’

      September 22, 2023

      RapidAscent’s Cyber Security Apprenticeship Program Earns California State Recognition

      September 22, 2023

      Cyber Security Today, Week in Review for the week ending Friday, Sept. 22, 2023

      September 22, 2023
    • Computing

      Recent Updates on Foreign Investment Restrictions and Export Controls Governing Semiconductors, Quantum Computing and Artificial Intelligence (AI) | Pillsbury Winthrop Shaw Pittman LLP

      September 23, 2023

      The US Could Require Cloud Computing Providers to Report Some Customers

      September 22, 2023

      Chan Zuckerberg Initiative Announces Project to End Human Disease

      September 22, 2023

      ARPA-H Data Fabric, Computing for Research, NextGen911

      September 22, 2023

      Can cloud-based quantum computing really offer a quantum advantage?

      September 22, 2023
    • Science

      Science Researcher at MCG to receive $90,000 grant to fix retinopathy of prematurity

      September 23, 2023

      PolyU researcher excels in fiber science and

      September 23, 2023

      The best workout apps for all kinds of exercisers

      September 23, 2023

      GSW’s bachelor’s degree in computer science accredited by ABET – Americus Times-Recorder

      September 22, 2023

      Watch: Chicago Students Mark Museum of Science and Industry’s 90th Birthday with Volcanic Eruptions | Chicago News

      September 22, 2023
    Facebook Twitter Instagram
    Now Tec BlogNow Tec Blog
    • Home
    • Business

      6 critical things to know about the autoworkers strike that threatens to reshape the economy, politics, and labor’s future

      September 23, 2023

      ‘I felt betrayed’: Health influencers are gaining notoriety for lies and lawsuits over deceptive marketing and claims that are too good to be true

      September 22, 2023

      Chase Ink Business Unlimited review: an easy 1.5% cash back on all purchases

      September 22, 2023

      After calamitous wildfires, California hopes to avert a collapse of its home insurance market by making rules more business friendly

      September 22, 2023

      Chase Ink Business Cash Review: 5% cash back for established businesses

      September 22, 2023
    • Gadgets

      Netflix Fall of the House of Usher Review: Exquisite Poe Tribute

      September 23, 2023

      You can find love on Tinder for $500 a month, if you qualify for its elite tier

      September 22, 2023

      iPhone 15 stuck on the Apple logo during setup? Here’s how to fix it

      September 22, 2023

      The FTC may file an antitrust lawsuit against Amazon as soon as next week

      September 22, 2023

      Bowing to pressure, Unity announces the terms of its surrender

      September 22, 2023
    • Tech

      Unity May Never Win Back the Developers It Lost in Its Fee Debacle

      September 22, 2023

      Satellite Images Show the Devastating Cost of Sudan’s Aerial War

      September 22, 2023

      ‘Majority’ Imagines Internet Hate Mobs to the Extreme

      September 22, 2023

      These scientists live like astronauts without leaving Earth

      September 22, 2023

      Inside the Race to Stop a Deadly Viral Outbreak in India

      September 22, 2023
    • World

      Poland’s PM tells Ukraine’s Zelenskyy to ‘never insult’ Polish people again | Russia-Ukraine war News

      September 23, 2023

      US auto workers expand strike as Biden prepares to join picket line | News

      September 23, 2023

      Amid canal dispute, Haitian migrants prepare to leave Dominican Republic | Border Disputes News

      September 22, 2023

      Young Chinese choose dating, staying single as marriages decline in China | Arts and Culture News

      September 22, 2023

      CIA abuse rendered 9/11 defendant unfit for trial: US military judge | September 11 News

      September 22, 2023
    • AI

      AI now bringing Jesus to your phone

      September 23, 2023

      AI could be the next tool to prevent veteran suicide

      September 22, 2023

      Leader Schumer Holds the Senate’s Inaugural AI Insight Forum — AI: The Washington Report | Mintz – Antitrust Viewpoints

      September 22, 2023

      AI Legal News Summer Roundup: Edition 5 | White & Case LLP

      September 22, 2023

      Benjamin Netanyahu talks to Elon Musk about AI cannibalizing more jobs than it creates

      September 22, 2023
    • Apple

      Best MacBook deals: 15-inch and 13-inch MacBook Airs at all-time low prices at Best Buy

      September 22, 2023

      Alexa Generative AI Update Reveal At Amazon’s Annual Device Event – Amazon.com (NASDAQ:AMZN)

      September 22, 2023

      Alexa Generative AI Update Reveal At Amazon’s Annual Device Event – Amazon.com (NASDAQ:AMZN)

      September 22, 2023

      Pay For Higher Gas Prices With These Oil Dividends

      September 22, 2023

      US Secretary of State Anthony Blinken Praises William Ruto for Promoting Democracy, Growing Economy

      September 22, 2023
    • ChatGPT

      Browse With Bing Returns To ChatGPT iPhone App With Links

      September 22, 2023

      What the Tech? Can ChatGPT help students?

      September 22, 2023

      How companies are embracing generative AI…or not

      September 22, 2023

      George R.R. Martin demanda a ChatGPT por “robo masivo”

      September 22, 2023

      ChatGPT: 17 authors sue OpenAI for copyright infringements  

      September 22, 2023
    • Cyber Security

      Bragar Eagel & Squire, P.C. Reminds Investors

      September 23, 2023

      ‘Power, influence, notoriety’: The Gen-Z hackers who struck MGM, Caesars

      September 22, 2023

      Governor Confirms A ‘Major Cyber-Attack’

      September 22, 2023

      RapidAscent’s Cyber Security Apprenticeship Program Earns California State Recognition

      September 22, 2023

      Cyber Security Today, Week in Review for the week ending Friday, Sept. 22, 2023

      September 22, 2023
    • Computing

      Recent Updates on Foreign Investment Restrictions and Export Controls Governing Semiconductors, Quantum Computing and Artificial Intelligence (AI) | Pillsbury Winthrop Shaw Pittman LLP

      September 23, 2023

      The US Could Require Cloud Computing Providers to Report Some Customers

      September 22, 2023

      Chan Zuckerberg Initiative Announces Project to End Human Disease

      September 22, 2023

      ARPA-H Data Fabric, Computing for Research, NextGen911

      September 22, 2023

      Can cloud-based quantum computing really offer a quantum advantage?

      September 22, 2023
    • Science

      Science Researcher at MCG to receive $90,000 grant to fix retinopathy of prematurity

      September 23, 2023

      PolyU researcher excels in fiber science and

      September 23, 2023

      The best workout apps for all kinds of exercisers

      September 23, 2023

      GSW’s bachelor’s degree in computer science accredited by ABET – Americus Times-Recorder

      September 22, 2023

      Watch: Chicago Students Mark Museum of Science and Industry’s 90th Birthday with Volcanic Eruptions | Chicago News

      September 22, 2023
    Now Tec BlogNow Tec Blog
    Home»Cyber Security»Impact of IMO 2023 on Cybersecurity
    Cyber Security

    Impact of IMO 2023 on Cybersecurity

    eduardo_alves38By eduardo_alves38June 4, 2023Updated:June 4, 2023No Comments7 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Impact of IMO 2023 on Cybersecurity
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Published June 4, 2023 at 2:07 PM

    ABS

    [By: Geoffrey Davis is Principal Cyber Consultant at ABS Group]



    What is IMO2023?


    In 2011, the International Maritime Organization (IMO) enacted rules for new ships to reduce the amount of CO2 emitted by ships, called the Energy Efficiency Design Index (EEDI). In 2023, a new IMO regulation created the Energy Efficiency Existing Ship Index (EEXI) to assess the efficiency of existing ships. In addition to IMO regulations, in 2021 the European Commission (EC) adopted a series of proposals called Fit for 55, aimed at reducing net greenhouse gas emissions by at least 55% by 2030. . IMO 2023 and Fit for 55 are below. It aims to reduce greenhouse gas emissions from the shipping industry by increasing the efficiency of ships. While these regulations are essential for environmental sustainability, they also have a significant impact on operational technology (OT) cybersecurity in the maritime industry.


    These regulations require vessels to reduce their carbon intensity by a percentage compared to their baseline. To achieve this, shipping companies invest in new technologies and equipment to increase the efficiency of their ships. These technologies typically require greater integration between her OT systems onboard the vessel and from those systems to cloud-based infrastructure for real-time monitoring.


    What are OT systems, and what are the cybersecurity challenges that OT systems add to the marine environment?


    Operational Technology (OT) systems are used to control and monitor vessel operations. This includes bridge and engine room systems such as radar, electronic chart display and information system (ECDIS), automatic identification system (AIS), engine monitoring, and radar. Cargo surveillance. These systems are essential for the safe operation of ships and require a high degree of security to prevent cyber-attacks. However, OT networks face unique cybersecurity challenges that make them more vulnerable to attacks.


    legacy system


    One of the biggest challenges with OT networks is that many of these systems were designed decades ago and were not built with cybersecurity in mind. These systems may have outdated operating systems, applications, and protocols that are vulnerable to attacks. Additionally, many of these systems cannot be easily updated or replaced due to their critical nature and cost.


    Poor authentication and access control


    Authentication and access control are essential to prevent unauthorized access to OT networks. However, these controls are often incorrectly implemented in his OT network. For example, passwords may be weak or shared, or access controls may not be properly enforced. This makes it easier for attackers to gain unauthorized access to your network and carry out attacks.


    Lack of visibility and oversight


    OT networks often lack proper visibility and monitoring, and administrators may not be able to detect security breaches or anomalies within the network. This makes it difficult to respond to incidents quickly and effectively. Additionally, many OT systems are not designed to generate logs or alerts, making attack monitoring and detection even more difficult.


    What are the cybersecurity risks associated with IMO 2023?


    New technologies being installed on ships to meet IMO 2023 efficiency standards generally require greater integration between OT systems on board ships and from those systems to cloud-based infrastructure. This enhances cybersecurity in the following ways:


    Increased attack surface


    The need for real-time data flow and connectivity between ship OT systems requires these systems to be further connected with shore systems. This exposes his OT system on the ship to other systems on board, external networks and cloud-based infrastructure, thus increasing the potential attack surface for cyber threats.


    supply chain attack


    Supply chain attacks are a growing concern across the industry as we increasingly rely on technology to manage our operations. A supply her chain attack occurs when an attacker compromises a third party her vendor or supplier and uses this access to infiltrate the target organization’s systems. For example, attackers may target software vendors that provide critical systems on board ships, such as cargo tracking systems. If an attacker gains access to the vendor’s system, they could use this access to plant malware or gain access to the ship’s systems.


    USB device


    USB devices are ubiquitous, especially in the maritime industry to move data to and from segmented environments. However, it also poses significant cybersecurity risks to OT networks. USB devices can bring malware, viruses and other types of malicious software into his OT network if not used properly. This is why USB device hygiene is critical to his OT network cybersecurity.


    What is network segmentation and why is it important?


    Network segmentation is an important security control in OT systems. Network segmentation refers to the technique of dividing a network into smaller, discrete parts, each with its own security controls. Network segmentation is especially important in OT systems for the following reasons:


    Minimize your attack surface


    Segmenting your OT network reduces the number of devices that can be accessed from a single point, minimizing your network’s attack surface. Dividing the network into smaller segments reduces the number of systems that unauthorized users can access.


    Limited attack range


    In the event of a cyber-attack, network segmentation helps limit the scope of the attack. By dividing the network into smaller segments, an attacker’s access is restricted to that segment only. This helps prevent attackers from moving laterally within the network and accessing sensitive systems.


    Mitigate the impact of a security breach


    Even with the best security controls in place, a security breach can still occur. Network segmentation helps reduce the impact of security breaches by limiting damage.


    How do we address the increased cybersecurity risks implied by IMO 2023?


    Increased attack surface


    To mitigate the risks posed by the increased attack surface, shipping companies must implement robust cybersecurity measures in their OT environments. Network segmentation, access control, and intrusion detection systems are essential to ensuring the safety and resilience of OT systems. Also, the carrier must ensure that his OT systems are regularly updated and patched to prevent exploitation of vulnerabilities.


    supply chain attack


    To mitigate the risk of supply chain attacks, shipping companies should carefully scrutinize their third-party vendors and suppliers. This includes conducting regular security audits of these vendors to ensure they follow cybersecurity best practices. Vessels should also implement network segmentation to limit the damage an attacker can do if they gain access to the vessel’s systems through a third-party vendor.


    Sanitation of USB devices


    Carriers should prohibit unapproved USB devices from being used on the OT network. This can be achieved by locking down USB ports on the system or implementing a USB access control policy. Vessel crews should also scan USB devices for malware before allowing them to be used on the OT network. This can be accomplished by implementing antivirus software on all systems on your network, or by using specialized malware scanning tools designed for USB devices. Finally, organizations should implement USB device usage policies that specify how USB devices are used on the OT network. These policies should cover topics such as how USB devices are authorized for use, how they are scanned for malware, and how data on USB devices is encrypted.



    Article author:


    Geoffrey Davis is the Principal Cyber ​​Consultant at ABS Group and a leading cybersecurity expert with over 15 years of experience. He is a Certified Information Systems Security Professional (CISSP) with a career focused on operational technology (OT) cybersecurity. Geoffrey has worked in a variety of industries including the Department of Defense, Maritime and Manufacturing, helping organizations identify and mitigate cybersecurity risks in his OT environments. He has a deep understanding of his OT systems and has developed and implemented proven strategies to protect these critical systems from cyberattacks.

    The opinions expressed herein are those of the author and not necessarily those of The Maritime Executive.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    eduardo_alves38
    • Website

    Related Posts

    Bragar Eagel & Squire, P.C. Reminds Investors

    September 23, 2023

    ‘Power, influence, notoriety’: The Gen-Z hackers who struck MGM, Caesars

    September 22, 2023

    Governor Confirms A ‘Major Cyber-Attack’

    September 22, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks

    Browse With Bing Returns To ChatGPT iPhone App With Links

    September 22, 2023

    What the Tech? Can ChatGPT help students?

    September 22, 2023

    How companies are embracing generative AI…or not

    September 22, 2023

    George R.R. Martin demanda a ChatGPT por “robo masivo”

    September 22, 2023
    Top Reviews
    Advertisement
    Demo
    Now Tec Blog
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • About us
    • DMCA
    • Privacy Policy
    © 2023 nowtecblog. Designed by nowtecblog.

    Type above and press Enter to search. Press Esc to cancel.