Академический Документы
Профессиональный Документы
Культура Документы
SECURITY
Presented by:
Raveen Ajith
INTRODUCTION
Pros: Cons:
o This change has also meant that companies have inherited vulnerabilities and
risks related to technology.
Cyber security:
Techniques of protecting computers, networks, programs and data from
unauthorized access or attacks that are aimed for exploitation.
Threats To The Maritime Industry
SPEAR PHISHING
Individuals are targeted with
personal emails
Extent-breach the
system- vulnerability-
method of delivery
RECONNAISSAN
DELIVERY BREACH EFFECT
CE
• The vulnerability of these systems can increase when they are integrated
with navigation and communications equipment on ships
Access control systems
• CCTV, SSAS etc. are part of the access control systems with
interfaces to shore side networks.
JUNE 2017
LA Port Terminal operated
by Maersk Lines Shut Down
Following a Ransom-ware
attack “Petya” which
demanded $300 in Bitcoins
as ransom.