Podcast
Questions and Answers
What are the two main categories of cyber threats that can affect companies and ships?
What are the two main categories of cyber threats that can affect companies and ships?
What is malware?
What is malware?
What is the purpose of ransomware?
What is the purpose of ransomware?
What is a phishing attack?
What is a phishing attack?
Signup and view all the answers
What is the purpose of an exploit?
What is the purpose of an exploit?
Signup and view all the answers
What is a vulnerability in a computer system?
What is a vulnerability in a computer system?
Signup and view all the answers
What is the purpose of a scan attack?
What is the purpose of a scan attack?
Signup and view all the answers
What is a typo squatting attack?
What is a typo squatting attack?
Signup and view all the answers
What is the main concern of cybersecurity in the maritime industry?
What is the main concern of cybersecurity in the maritime industry?
Signup and view all the answers
What is a potential consequence of a cyber incident on a ship?
What is a potential consequence of a cyber incident on a ship?
Signup and view all the answers
What is an example of a cyber incident that can occur during maintenance?
What is an example of a cyber incident that can occur during maintenance?
Signup and view all the answers
What is the most common vector of attack by threat actors?
What is the most common vector of attack by threat actors?
Signup and view all the answers
What is an example of critical data that can be compromised in a cyber incident?
What is an example of critical data that can be compromised in a cyber incident?
Signup and view all the answers
What is the primary goal of cybersecurity on a ship?
What is the primary goal of cybersecurity on a ship?
Signup and view all the answers
What is a potential consequence of a corrupted ECDIS system?
What is a potential consequence of a corrupted ECDIS system?
Signup and view all the answers
What is an example of a system that can be affected by a cyber incident?
What is an example of a system that can be affected by a cyber incident?
Signup and view all the answers
What is a vulnerability of providing access to Internet and email on a ship?
What is a vulnerability of providing access to Internet and email on a ship?
Signup and view all the answers
What type of systems should not be connected to critical systems for security on a ship?
What type of systems should not be connected to critical systems for security on a ship?
Signup and view all the answers
What is a recommended feature of communication systems on a ship?
What is a recommended feature of communication systems on a ship?
Signup and view all the answers
What should be considered when implementing cyber defense mechanisms on a ship?
What should be considered when implementing cyber defense mechanisms on a ship?
Signup and view all the answers
What type of information is transmitted to authorities via communication systems on a ship?
What type of information is transmitted to authorities via communication systems on a ship?
Signup and view all the answers
What is a risk of using VSAT signals on a ship?
What is a risk of using VSAT signals on a ship?
Signup and view all the answers
What is a capability of communication systems on a ship?
What is a capability of communication systems on a ship?
Signup and view all the answers
What should be strictly implemented on a ship's communication systems?
What should be strictly implemented on a ship's communication systems?
Signup and view all the answers
What is the primary goal of identifying vulnerabilities in a system?
What is the primary goal of identifying vulnerabilities in a system?
Signup and view all the answers
Who can facilitate the identification of vulnerabilities in a system?
Who can facilitate the identification of vulnerabilities in a system?
Signup and view all the answers
What caused the failure of all the ECDIS computers on the ship?
What caused the failure of all the ECDIS computers on the ship?
Signup and view all the answers
What was the consequence of the failure of the navigation systems on the ship?
What was the consequence of the failure of the navigation systems on the ship?
Signup and view all the answers
Why did the software update on the navigation computers fail?
Why did the software update on the navigation computers fail?
Signup and view all the answers
What was required before the ship could set sail again?
What was required before the ship could set sail again?
Signup and view all the answers
Who was responsible for the costs of the delays?
Who was responsible for the costs of the delays?
Signup and view all the answers
What was required by the company after the incident?
What was required by the company after the incident?
Signup and view all the answers
What is the main emphasis of the incident?
What is the main emphasis of the incident?
Signup and view all the answers
What is the primary goal of a network evaluation on a ship?
What is the primary goal of a network evaluation on a ship?
Signup and view all the answers
What type of vulnerabilities can a ship's systems be prone to?
What type of vulnerabilities can a ship's systems be prone to?
Signup and view all the answers
What is the benefit of having independent systems on a ship?
What is the benefit of having independent systems on a ship?
Signup and view all the answers
What should be considered when designing a ship's network?
What should be considered when designing a ship's network?
Signup and view all the answers
What is a potential consequence of a ship's systems being connected to uncontrolled networks?
What is a potential consequence of a ship's systems being connected to uncontrolled networks?
Signup and view all the answers
What type of systems might be included on a ship?
What type of systems might be included on a ship?
Signup and view all the answers
Why is it important to understand how critical systems on a ship connect to uncontrolled networks?
Why is it important to understand how critical systems on a ship connect to uncontrolled networks?
Signup and view all the answers
Study Notes
Ciberseguridad y Gestión de Riesgos
- Ciberseguridad es importante porque puede afectar a la tripulación, el barco, el medio ambiente, la empresa y la carga.
- La ciberseguridad se ocupa de la protección de TI, OT, información y datos contra el acceso no autorizado, la manipulación y la interrupción.
Tipos de Ciberamenazas
- Existen dos categorías de amenazas cibernéticas: ataques no dirigidos y ataques dirigidos.
- Ataques no dirigidos utilizan herramientas y técnicas disponibles en Internet para localizar, descubrir y explotar vulnerabilidades generalizadas.
- Ataques dirigidos tienen como objetivo previsto los sistemas y datos de una empresa o un barco.
Ciberamenazas Específicas
- Malware: software malicioso diseñado para acceder o dañar una computadora sin el conocimiento del propietario.
- Existen varios tipos de malware, incluyendo troyanos, ransomware, spyware, virus y gusanos.
- Ransomware cifra los datos de los sistemas hasta que se paga un rescate.
- Malware puede aprovechar deficiencias y problemas conocidos en software empresarial desactualizado o sin parches.
- Exploitar: utilizar un software o código para aprovechar y manipular un problema en otro software o hardware de computadora.
- Pozo de agua: establecer un sitio web falso o comprometer un sitio web genuino para explotar a visitantes desprevenidos.
- Escaneo: buscar al azar en grandes porciones de Internet vulnerabilidades que podrían ser explotadas.
- Errores tipográficos: también llamado secuestro de URL o URL falsa, se basa en errores como errores tipográficos cometidos por usuarios de Internet al ingresar la dirección de un sitio web en un navegador web.
Sistemas Vulnerables
- La identificación de vulnerabilidades implica un análisis de las aplicaciones, sistemas y procedimientos para descubrir debilidades que podrían ser aprovechadas por amenazas potenciales.
- Puede ser facilitado por expertos internos y/o respaldado, según corresponda, por expertos externos con conocimientos de la industria marítima y sus procesos clave.
- Sistemas independientes serán menos vulnerables a los ciberincidentes externos en comparación con aquellos conectados a redes no controladas o conectados directamente a Internet.
- El diseño y la segregación de la red se explicarán con más detalle en el Anexo 3.
- Se debe tener en cuenta el elemento humano, ya que muchos incidentes se inician por acciones del personal.
Incidentes Cibernéticos
- Un barco con un sistema de puente de navegación integrado sufrió un fallo de casi todos los sistemas de navegación en el mar, en una zona de mucho tráfico y visibilidad reducida.
- La causa del fallo se atribuyó a sistemas operativos obsoletos.
- El incidente enfatiza que no todas las fallas informáticas son el resultado de un ataque deliberado y que el software obsoleto es propenso a fallar.
Sistemas Críticos a Bordo
- Sistemas de gestión de carga y carga: sistemas digitales utilizados para la carga, gestión del barco o el bienestar de la tripulación son particularmente vulnerables cuando se proporciona acceso a Internet y correo electrónico.
- Sistemas de comunicación: la disponibilidad de conectividad a Internet vía satélite y/u otras comunicaciones inalámbricas aumenta la vulnerabilidad de los barcos, y acontecimientos recientes indican que, por ejemplo, las señales VSAT son vulnerables a la explotación utilizando productos de bajo costo y disponibles en el mercado.
- Se deben considerar sistemas de comunicación con cifrado.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.