Essay Undergraduate 845 words Human Written

Maritime Security

Last reviewed: ~4 min read Social Science › Maritime Security
80% visible
Read full paper →
Paper Overview

Module 4 Case Paper: Maritime Security Introduction Maritime cyber attacks have already occurred in recent history, indicating the threat that cyber warfare poses for maritime security. The reality of this situation is so pressing that new International Maritime Organization (IMO) Cyber Security regulations are set to come into effect in 2021 (Klopper, 2019)....

Full Paper Example 845 words · 80% shown · Sign up to read all

Module 4 Case Paper: Maritime Security
Introduction
Maritime cyber attacks have already occurred in recent history, indicating the threat that cyber warfare poses for maritime security. The reality of this situation is so pressing that new International Maritime Organization (IMO) Cyber Security regulations are set to come into effect in 2021 (Klopper, 2019). This paper will discuss the growing maritime threats that have been brought about by advances in technology as well as the potential countermeasures to protect ports and ships from involuntarily participating in a WMD terrorist attack.
Growing Maritime Threats Brought about by Advances in Technology
Growing maritime threats that have come about as a result of technological advances include the ability of hackers to penetrate computer systems from thousands of miles away and that ability of spoofers to spoof GPS signals and thus reroute ships and potentially crash them. Two incidents in recent memory have already occurred showing that both of these threats are real. The first is the Norsk Hydro Aluminium Smelter attack and the second is the February 2019, the Port of New York incident the US Coast Guard announced that a “deep draft vessel on an international voyage bound for the Port of New York and New Jersey reported that it was experiencing a significant cyber incident impacting its shipboard network” (U.S. Coast Guard, 2019). The malware attack experienced by the vessel caused it to lose important cybersecurity measures, meaning it became vulnerable to additional attacks. Malware similarly affected the Norsk Hydro Smelter. The Norsk Hydro Aluminum Smelter attack caused operations to halt as the plant battled to regain control of its operations from malware that had infected the system (Fouche & Solsvik, 2019).
The Port of New York incident was the result, as is almost always the case, of end user error—end users are those who use the computers and are most vulnerable to security flubs: hackers can use phishing methods to get an end user to click on a link that brings malware to the system, or they can leave their passwords exposed that can give hackers access to onboard systems. This is what happened in the Port of New York incident and it suggests that end users aboard ships need to be following tightly regimented protocols.
Potential Countermeasures to Protect Ports and Ships
The best way to protect against cyberattack is to educate end users on the risks of being hacked through phishing methods and the importance of engaging security password protection—which means not using the same password as one uses with other systems, changing passwords routinely, and not sharing passwords within anyone (Charoen, Raman & Olfman, 2008).
Aside from that, the U.S. Coast Guard (2019) recommends a variety of options to improve cybersecurity systems. These include:
· Segmenting networks—networks that are flat are more easily penetrated by hackers; segmenting them allows the network to impose firewalls on itself so that it is less easily penetrable by hackers;
· Creating network profiles for all employees; administrator accounts can also be effective in reducing the risk of end users leaving a door open through negligence or inattention;
· Using caution with all external media; all external media should be scanned for malware before being plugged into system networks; even banning all external media can be a good idea;
· Installing antivirus software that is always updating;
· Patching so that vulnerabilities to cybersecurity systems and applications are addressed routinely (U.S. Coast Guard, 2019).
These are simple and basic solutions, but one of the biggest problems creating risks for ports and ships is failure to take care of the basic steps that help to protect ships and ports. Educating end users, segmenting networks, and using prudent computer risk management can go a long way in protecting people.
Another countermeasure that may be worth examining in the future is creating a system network that cannot be accessed outside of a centralized remote caller, where all information and instructions come from. Today’s drones are flown from hundreds of miles away. If ships can be navigated by safe systems that are resistant to penetration, it would help to prevent takeovers of ships and protect ports.
Finally, the Container Security Initiative (CSI) is important to maintain, as it ensures that every container is inspected by maritime security forces prior to loading and shipping. This could prevent the kind of situation in which a ship is hacked and a container detonated by remote.
Conclusion
Maritime security is a serious issue that needs to be addressed so as to reduce the risk of injury to people on board on at ports. The best ways to improve security are often the simplest—improving end user knowledge, improving network safety fundamentals, and improving container inspection.

References
Charoen, D., Raman, M., & Olfman, L. (2008). Improving end user behaviour in
password utilization: An action research initiative. Systemic Practice and Action Research, 21(1), 55-72.
Fouche, G. & Solsvik, T. (2019). Aluminum maker Hydro battles to contain ransomware
attack. Retrieved from https://www.reuters.com/article/us-norsk-hydro-cyber/aluminum-maker-hydro-battles-to-contain-ransomware-attack-idUSKCN1R00NJ
Klopper, E. (2019). The importance of maritime cybersecurity. Retrieved from
https://cyber1.com/press-release/the-importance-of-maritime-cybersecurity/
U.S. Coast Guard. (2019). Cyber Incident Exposes Potential Vulnerabilities Onboard
Commercial Vessels. Retrieved from https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/CG-5PC/INV/Alerts/0619.pdf





 

169 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
1 source cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Maritime Security" (2020, January 13) Retrieved April 22, 2026, from
https://www.paperdue.com/essay/maritime-security-essay-2175952

Always verify citation format against your institution's current style guide.

80% of this paper shown 169 words remaining