INTRODUCTION of The
cybersecurity challenges
In this project, there is brief
information available on marine cybersecurity risks and its main challenges. Every
industry in the world is struggling with cybercrime issues. The main problem is
that cybercrime issues are increasing in the marine and shipping industry. Marines
are facing a lot of problems during their missions because of cybersecurity
risks. Therefore, it is required to analyse the main risks and challenges of
cybersecurity that are related to the marine industry. This is because as
technology is increasing the risk of cybersecurity is also enhancing. Due to
this case, there is proper information about the risk related to the marine
industry (Scully, 2014).
The main cause of this problem is that
technology is increasing. Due to these many systems are moving towards the
online structure. In that case, there will be challenges for CSIA in the
industries. The main consequences will be related to data breaching. It can be
noted that if these issues are not tackled by the industry then they may lose
important data. Due to this, there will be a huge problem for this industry
that can damage the foundation of the country. This is because the marine
industry is extremely important especially for Oman. Some common software and
systems to reduce external access are MAC, RBAC, and DAC.
This a relevant problem is for many years
because many industries are facing. They don’t have such a system that can
easily perfectly deal with cybercrime issues and IS challenges. Therefore, many
industries are applying different and valuable tools for dealing with
cybersecurity risks in an efficient way. The other industries are not able to
tackle this problem due to many reasons. The first reason is that their
infrastructure is extremely big that makes it more difficult. The next reason
is related to the software technical team is not perfect. Due to these reasons,
it will become extremely difficult for different industry to minimize the risk
of cybersecurity.
It is also observed that this problem is
related to the application of data breaching. This problem is related to
cybercrime issues present in different industries of the world. Due to this
fact, many companies in the world are losing their important data. This shows
that this problem is related to networking attacks through the use of
cybercrime issues (Amoroso, 2012).
This project is addressing the marine
industry. This is because, from the past, it can be observed that this industry
has gone through a high-quality transformation and changes in the past.
Moreover, the main purpose of this industry is to grow in the form of an
automation system. This is why it is considered to be the most important aspect
of the marine industry. But the fact is that as technology is increasing in the
marine industry there will be an increase in cybercrime threats. Due to this
problem, it will become a huge challenge for the company. This study is
addressing major challenges related to cybercrime in the marine industry
(Kazan, 2016).
There are many members from some
important industries will be interested in this project because it is
considered as a global issue and first of all the government of the company.
The main reason is that it is considered a global issue because there are many
companies that are affected and it is damaging the economic condition of the
country. The next thing is that important departments will be interested in
this project because this department includes banks, defence, and health care centres.
All of them will be interested in this project related to highlighting the
challenges related to cybercrime.
Moreover, this problem is existing in
every department of the world. It can be noted that any industry of the world
that contains an online system to carry out different tasks of the industry
will face such issues related to data breaching and other cybercrime issues.
Due to this fact cybercrime is considered the most important challenge around
the world also for the marine industry. This problem exists when different
industries of the world are converted their system into automation. For this
approach, their whole data is published online and there will be a high risk of
losing their important data (Cook, et al., 2016).
Chapter
2:
LITERATURE REVIEW of The
cybersecurity challenges
If any technology is used on a small
scale, its issues and problems can also be small. But with time things become
bigger and its related risks or threats will also become bigger and
complicated. That's why individuals and companies must stay alert and come up
with various countermeasures so that they can avoid cyber-attacks in the first
place, and if they do happen, then they must have a plan to deal with those
threats
Cybersecurity is one of the biggest
concerns of recent times, and if considerable countermeasures will not be taken
by stakeholders, then they may face severe consequences. The individuals,
companies, and governments should come up with policies and systems to protect
their data and sensitive information by developing and implementing above
mentioned countermeasures because this is the only way to effectively deal with
cybersecurity issues (cyberdefensemagazine, 2019).
As stated by Kazan (2016), the process to
maintain as well as achieving secure cyberspace is very difficult and complex.
Furthermore, it also concerns with intellectual property, sustainability,
privacy, the critical infrastructure as well as the personal identity of the
organization. The threats for making secure the operating infrastructure are
profound serious such as cybercrime, cyber terrorism, and cyber espionage. Therefore,
cyber-war for the kind of the technical community has responded with the
procedures as well as safeguards and normally the private sector supplies. The
whole study gives very brief information on the security within the cyber
domain with the objective of the developing techniques of cybersecurity (Kazan,
2016).
Knowles et al. (2015) also described that
it has identified by the dearth of the security metrics for the specific
industrial control system as a hurdle for the implementation of this kind of
methodology. Therefore, an agenda is outlined in the industrial security
control system metrics for future research. To handle the fail-secure as well
as a fail-safe of the industrial control system operations, the concept of
functional assurance is also introduced (Knowles, et al., 2015). The main cause
of this problem is that technology is increasing. Due to these many systems are
moving towards the online structure. In that case, there will be a huge risk of
cybersecurity issues in the industry. The main consequences will be related to
data breaching. It can be noted that if these issues are not tackled by the
industry then they may lose important data. Due to this, there will be a huge
problem for this industry that can damage the foundation of the country. This
is because the marine industry is extremely important especially for Oman
As described by Andrew E Tucci in his
research on cybersecurity risks the relevant problem is for many years because
many industries are facing. They don't have such a system that can easily
perfectly deal with cybercrime issues. Therefore, many industries are applying
different and valuable tools for dealing with cybersecurity risks in an
efficient way. The other industries are not able to tackle this problem due to
many reasons. The first reason is that their infrastructure is extremely big
that makes it more difficult. The next reason is related to the software
technical team is not perfect. Due to these reasons, it will become extremely
difficult for different industries to minimize the risk of cybersecurity
(Tucci, 2013). This project is addressing the marine industry. This is because,
from the past, it can be observed that this industry has gone through a
high-quality transformation and changes in the past. Moreover, the main purpose
of this industry is to grow in the form of an automation system. This is why it
is considered to be the most important aspect of the marine industry. But the
fact is that as technology is increasing in the marine industry there will be
an increase in cybercrime threats. Due to this problem, it will become a huge
challenge for the company. This study is addressing major challenges related to
cybercrime in the marine industry.
DaiRenzo (2010) also stated in his
research study that there are many members from some important industries will
be interested in this project because it is considered as a global issue and
first of all the government of the company. The main reason is that it is
considered a global issue because many companies are affected and it is
damaging the economic condition of the country. The next thing is that
important departments will be interested in this project because this
department includes banks, defence, and health care centres. All of them will
be interested in this project related to highlighting the challenges related to
cybercrime. Moreover, this problem is existing in every department of the
world. It can be noted that any industry of the world that contains an online
system to carry out different tasks of the industry will face such issues
related to data breaching and other cybercrime issues. Due to this fact
cybercrime is considered the most important challenge around the world also for
the marine industry. This problem exists when different industries of the world
are converted their system into automation. For this approach, their whole data
is published online and there will be a high risk of losing their important
data (DiRenzo, 2010).
Explain Eskonj described that the risk
and challenges of security occur all the time and it can’t be measured easily.
The marine system needs good security systems for resolving the challenges and
risks that occur in cybersecurity. Usually, the marine industry has been gone
by using the incredible transformation in the last several years on a large
scale. The major purpose of the industry growth is considered as automation and
it is one of the most important reason aspects in the marine industry. In the shipping industry, by increasing the
automation the constant threats for the ships in cyberspace can be increased.
This study is conducted to measure the challenges of the cyber in the marine.
The risk of cybersecurity is developing
gradually and in various industries, these risks are grasping the era trends of
the industry in effective manners. The cyber-attacks methods are engaged in
changing constantly. To employ the mandatory measures of cybersecurity, it is
increasingly difficult for preventing them. These are the good sources in the
forms of cybersecurity for enhancing the systems and mechanism of the marine
industry (Skjong, 2016).
Jones K.D states that several
cyber-attacks can occur during the implementation of cybersecurity in the
shipping industry. A few of the
important attacks are malware contamination, data breaches, invoice frauds and
incidents of the ransomware. To protect the data on the servers of the ships
for protection from various threats, it has become most important and
essential. Any given enterprise can be protected by the cybersecurity against
the numerous cyber-attacks. It also protects from unauthorized access for the
particular computerized systems otherwise it can hack badly. Due to the rapid
growth of technology; digitization is also embraced in the shipping or maritime
industry. The various cost savings, as well as efficiencies, are embraces in
the maritime industry as well and it all comes with it. In all of these aspects
and perspectives, security can be often taken as for granted. Unfortunately, if
such kinds of the system will be evolved than the numbers of the hackers can be
enhanced and their methods are becoming more advanced with time. Such as;
phishing emails are always required for the dawn of an email. (Jones, 2015).
Tam
(2012) also described their point of view and says that if any innovation is
utilized from a more minor perspective then its issues can be little. The
reason is very simple and basic for people and organizations to remain informed
and always in search of different countermeasures. So, they can maintain a strategic distance
from cyber-attacks in any case, and if they occur, at that point they should
have the arrangement to manage those dangers. Cybersecurity is probably the
greatest worry of late occasions, and if impressive countermeasures won't be
taken by partners, at that point they may confront extreme outcomes. The
people, organizations, and governments should think of arrangements and
frameworks to ensure their information and delicate data by creating and
actualizing previously mentioned countermeasures since this is the best way to
viably manage cybersecurity issues (Tam, 2012).
As expressed by Kazan (2016), the procedure
to keep up just as accomplishing secure the internet is extremely troublesome
and complex, just as it likewise worries with licensed innovation,
supportability, protection, the basic framework just as the individual
personality of the association. The dangers for making secure the working
framework are significant just as genuine, for example, cybercrime, digital
psychological warfare, digital undercover work just as a cyber-war for the sort
of the specialized network has reacted with the strategies just as shields and
ordinarily the private part supplies. The entire examination gives brief data
on the security inside the digital space with the target of creating procedures
of cybersecurity. This a pertinent issue is for a long time because numerous
ventures are confronting. They don't have such a framework that can without
much of a stretch superbly manage the cybercrime issues.
Accordingly, numerous ventures are
applying extraordinary and significant instruments for proficiently managing
digital security chances. Different enterprises can't handle this issue because
of numerous reasons. The main explanation is that their foundation is amazingly
enormous that makes it progressively troublesome. The following explanation is
identified with the product specialized group that isn't great. Because of
these reasons, it will turn out to be very hard for diverse businesses to limit
the danger of digital security. This undertaking is tending to the marine
business. This is because, from the past, it very well may be seen that this
industry has experienced a top-notch change and changes before. Also, the
principal motivation behind this industry is to develop as a computerization
framework. This is the reason it is viewed as the most significant part of the
marine business. Yet, the truth of the matter is that as innovation is
expanding in the marine business there will be an expansion in cybercrime
dangers (Kazan, 2016).
Knowles et al. (2015) likewise depicted
that it has distinguished by the lack of security measurements for the
particular modern control framework as an obstacle for the execution of this
sort of technique. Consequently, a plan is sketched out in the mechanical
security control framework measurements for future research. To deal with the
come up short secure just as a safeguard of the modern control framework
activities, the idea of useful affirmation is likewise presented. The primary
driver of this issue is that innovation is expanding. Because of these numerous
frameworks are moving towards the online structure. All things considered,
there will be a tremendous danger of digital security issues in the business.
The fundamental results will be identified with information breaking. It tends
to be noticed that on the off chance that these issues are not handled by the
business, at that point they may lose significant information. Because of this,
there will be a colossal issue for this industry that can harm the
establishment of the nation. This is because the marine business is critical
particularly for Oman.
Because of this issue, it will end up
being a colossal test for the organization. This examination is tending to
significant provokes identified with cybercrime in the marine business. There
are numerous individuals from some significant businesses that will be keen on
this venture since it is considered a worldwide issue and as a matter of first
importance the legislature of the organization. The primary explanation is that
it is considered as a worldwide issue because there are numerous organizations
are influenced and it is harming the financial state of the nation.
Interestingly, significant offices will be keen on this undertaking since this
division incorporates banks, barriers, and medicinal services places. Every one
of them will be keen on this task identified with featuring the moves
identified with cybercrime (Knowles, et al., 2015).
In this article, Lobo Gerorogy says that
Also, this issue is existing in each division of the world. It very well may be
noticed that any industry of the world that contains an online framework to do
various errands of the business will face such issues identified with
information penetrating and other cybercrime issues. Because of this reality
cybercrime is considered as the most significant test far and wide likewise for
the marine business. This issue exists when various enterprises of the world
are changed over their framework into computerization.
Lobo-Guerrero (2012) has also described in
the study that their entire information is distributed on the web for this
methodology. Besides, it will also be a high danger of losing their significant
information because several security threats happen constantly which can't be
estimated without the rise of any problem. The marine framework needs great
security frameworks for settling the difficulties and dangers that happen in
cybersecurity. For the most part, the marine business has been passed by
utilizing the mind-boggling change over the most recent quite a long while
everywhere scale. The significant motivation behind the business development is
considered as computerization and it is one of the most significant explanation
angles in the marine business. In the transportation business, by expanding the
mechanization the consistent dangers for the boats on the internet can be
expanded. This investigation is directed to quantify the difficulties of the
digital in the marine (Lobo-Guerrero, 2012).
Abkowitz use to say that the danger of
the cyber security is growing slowly and in different enterprises, these
dangers are getting a handle on the time patterns of the business in successful
habits. The digital assault strategies are occupied with evolving continually.
To utilize the compulsory proportions of cybersecurity, it is progressively
hard for forestalling them. These are the acceptable sources in the types of
cybersecurity for improving the frameworks and component of the marine business
there are a few digital assaults that can happen during the usage of
cybersecurity in the delivery business. A couple of the significant assaults
are malware tainting, information penetrates, receipt cheats, and occurrences
of the ransomware. To secure the information on the servers of the boats for
insurance from different dangers, it has gotten generally significant and
basic.
Some random undertaking can be secured by
cybersecurity against the various digital assaults. It additionally shields
from unapproved access for the specific automated frameworks else it can hack
gravely. Because of the quick development of innovation; digitization is
additionally grasped in the delivery or sea industry. The different cost
investment funds, just as efficiencies, are grasps in the sea business too and
everything accompanies it. In these viewpoints and points of view, security can
be regularly underestimated as. Shockingly, if such sorts of the framework will
be developed than the quantities of the programmers can be upgraded and their
strategies are getting further developed with the progression of time. For
example, phishing messages are constantly required for the beginning of an
email (Abkowitz, 2011).
Chapter
3:
RESEARCH
METHODOLOGY & DATA COLLECTION
3.1 Introduction of The cybersecurity challenges
In this section, the research methodology
on the cybersecurity risk and challenges is discussed that is telling that it
is the process or technique which is being used for the identification,
selection, processing, and analysing all of the information related to a
particular topic. Here in this part of the research, methodology, we are going
to find out the challenges that are being faced by the people related to marine
cybersecurity. The research methodology is particularly of four different types
but here we are using quantitative research.
Quantitative surveys: It is the kind of survey in which the researcher may
pose the same kinds of questions, mostly in the written form towards the sample
pieces. The same set of questions is being asked from a different group of
people from different areas and different age groups so that different answers
can be obtained. (Thompson, 2018)
Research methodology in this topic is
being done by the help of a quantitative survey, now the quantitative survey is
much different from the qualitative survey and other different kinds of
surveys. Here in this area, questionnaires are part of a quantitative
survey.
Many people may think that the
questionnaire survey is much easy as compared to the other research but in
actual it isn’t, because in the questionnaire survey there is the number of
different questions is supposed to be made according to the topic and keeping
in mind about the age, gender, and area of the people who will be part of the
research.
Here in this area, after doing or
undergoing and reviewing different articles that have been discussed in the
literature review above, a questionnaire was being prepared that contained all
of the factors that have been mentioned in the upper area,
●
What is the list of challenges that are being faced by the people
associated with cybersecurity?
●
Does this word Cybersecurity scare you?
●
What are the samples of the problems which you have faced because
of this cybersecurity?
These were some of the questions that
made part of the questionnaire along with the open-ended questions as well.
Where suggestions were being given by the audience. All the questions in the
questionnaire weren’t closed-ended whose answers could only be “Yes, No or
Maybe”. If only closed-ended questions become part of the questionnaire, then
there is no use of doing the survey and getting the information. Open-ended
questions are being mentioned or used particularly so that audience can tell
about their opinions and the maker of the questionnaire or the one behind the
research can come up with several different ideas because when variety comes in
answering then the questions’ results come uniquely and it gives a good
impression too. It also becomes much easier to interpret the results differently
All these factors were then grouped into
three different kinds of variables that are being commonly named as financial
factors, technological factors along with policy and procedure formalities
factors.
We were facing huge problem regard
distribution the questionnaire by website
for Martine IT services due to pandemic corona, it was difficult for them to
access and distribute the questionnaire for staff related to crowded emails and
they stuck in other issue related to staff home quarantine. And we did not
receive any reply or data from them.
3.2
An argument for the
research method of The cybersecurity challenges
In this research, a purposive sampling
methodology is the one that was being used. Now to make readers aware that what
purposive sampling methodology is? So it is also known as selective, judgmental,
or subjective sampling as well. It is one of the types which is non-probability
sampling in which the researchers completely rely upon their thinking or the
judgment while choosing the members of a population to get participation in
their study. The most important factor or reason to use purposive sampling is
to have focus on the specific characters of the population living in a
particular area from where the research is being done or data is about to be
collected. This population helps out to answer the questions that are most
suitable and are useful for the research as well. So here, it is a choice that
is being made up or the purpose which fluctuates depending upon the kind of
purposing sampling technique that is being sued. In this methodology, as talked
above questionnaire is the best kind (Ahokas). See table 2 and table 3 (in
appendix) which represent various methodologies used in the research project
for literature review, data collection, and analysis. Considering the situation
and security issues of marine companies, it is possible to conduct
questionnaires as we can reach all the companies, and extracting conclusions
without reaching wide data can induce an impact on the results. Moreover, the
best alternative is to consider the literature review and data provided by the department
of government.
Well using the well-defined and elaborated
data of the questionnaire was being collected from the number of different
people from different companies that have been the victims of cybersecurity or
the companies who are taking precautionary measures for this cybersecurity. All
of the members were being connected with the help of social media. All the
members were supposed to be collected in a particular area so that the
information could be obtained from them by all possible means. After getting in
contact with them through the help of social media, all members were given
appointments so that no hustle-bustle was made. All of the members were approached
personally and after approaching them, the questionnaire was showing them. They
were not only given the questionnaire to answer the questions on their no
matter whether they understood it or not? This is because questionnaires are
explained by students. It is considered as best way to answer all quarries. So,
every part was discussed to get the best answers and responses because most of
the efforts were being done in making the questionnaire and a single wrong
answer could disturb all the results easily. This project was not an easy
method because it took a lot of effort to make out the questionnaires. Many
people were afraid that why the data is being collected from them and they also
got afraid and completely refused to answer the questions as they thought their
name would get public on different social media platforms along with the
answers. In previous studies, many
researchers found difficulty in answering the questions. The questions in the
questionnaire do not clear all the conditions and what to answer and what to
not. So, the method is not an easy procedure at all to justify and make all the
people relaxed and easy. Moreover, I also understand that if your questionnaire
is short and concise. Then the respondents are showing honest response
according to these questions. Furthermore, if questionnaire is not short, then
respondents will not pay any kind of attention to the questions. Therefore, no
honest response will be obtained through this questionnaire.
3.3
The limitations of the
research of The cybersecurity challenges
Like every other research, we also have
some of the limitations of our research.
At first, it was being thought it would
be better to collect the number of different people from different areas as
research results would be way better as it depends upon the sample size and
opinions of different people but over time we realized sample size shouldn’t be
too much nor it should be too less. This should be in between to make sure the
results come out perfectly.
The next one is the time limit, it was
very less and in whole this wasn’t that much easy to manage out all of the
things together in such a limited period.
The next limitation is data people were
being contacted through the use of social media and it wasn’t a good data collection
process at all. One should always try to approach the people who are close and
near to them.
3.4
Ethical codes of the
cybersecurity challenges
Ethical codes for the research are:
(Slowther, 2006)
●
Honesty, we have reported all of the data and results with honesty
without making anything false.
●
Integrity. we have tried to keep up with their promises and
agreements.
●
Confidentiality is the part where it is necessary to protect all of
the confidential communication and we made sure not to disclose the name of any
person.
●
Objectivity, we have strived to avoid all of the bias in the
analysis of data, experimental design, and other steps as well.
●
We respect each other as a colleague.
3.5 Sampling of the cybersecurity challenges
Sampling technique which we have used for
our research methodology is the systematic sampling, in this kind of technique
or sampling different people from whom data needs to be collected are organized
in alphabetical order and then questionnaires were being filled up from them on
their specified turn.
3.6
Conclusion of the
cybersecurity challenges
In the conclusion of the research
methodology it has been found out that it was really interesting to collect
data about cybersecurity by using the quantitative survey as we came to know
much more about the cybersecurity and the issues that are being affiliated with
it and what people are facing.
Chapter
4:
FINDINGS
& ANALYSIS
4.1 Introduction of the cybersecurity challenges
Security is the basic need of every
person these days. With the advancement of technology, the increase in threats
is also increasing. Every company is motivated to do certain things and many of
them become successful in no time. This is not the point here, the success
makes every other person jealous and they start thinking negatively about the
struggling company. Rival companies start making plans to hurt them and make
their name bad in the market through all possible means. Here the basic thing
which is required is the need for a proper security system that can’t only make
the company safe but also the employees working in it. Every company should
know in the beginning that how and through which means proper security can be
given to their employees. Moreover, there are some important drawbacks of
hacking for the company. It can be noted that due these hacking activities, the
company will unable to stay in the market for a long period of time. The
results are showing that such companies are not able to survive in the market
because they loss data due to hacking. Moreover, in marine industry it is
extremely important to save and protect data. The main reason is that through
this data they can keep their secret and also product other people. If the
secret data of marine industry is not save then it will create phenomenal
problems for the company in the future.
4.2
Findings of
the cybersecurity challenges
Hacking of data or Cybercrime is one of
the biggest security-related issues, especially in Marine Cybersecurity. Any
hacker can sneak into the system and can have access to all the personal or
private data without even letting anyone know at all. Cybersecurity is being
used for the protection of data as we have learned by now, but here is the big
major drawback that only large organizations are using it as they are more
concerned about the security and privacy. They are afraid of hacking. Here we
would like to suggest that small organizations should also apply this or use
this security measure. It has made the lives easy for everyone as hackers can’t
hack any important thing through the internet.
Technological Disaster is another
security-related issue and can take place anywhere and at any moment. No one
has control over this thing as this is technological related. But it doesn’t
mean to leave it just the way it is without making it right. Different
engineers should be a part of the team to have a check on the systems at
regular intervals to know about any kind of the default in the system or
anything like this. This can be of much help to prevent incidents in the future
times.
There is a risk of malware that can spread
into the system through a network. Malware can hijack operations of the
software to use it for harmful purposes or to damage the reputation of the
company. The company is also vulnerable to a risk of cyber-attack because it is
using old software’s and the password security methods needs also needs
attention. There is also the risk of phishing attacks which is can lead to
leaking of sensitive information. Security and privacy regulations are one of
the most threatening issues these days and it needs to be stopped. Anyone can
sneak into the office or company and cause much harm to the employees and
system as well. The interest of many people around smart technology has risen
greatly since the last decade and still, many people eagerly want to know about
this technology. When this smart technology was introduced, many of the
employees and common people were not well aware of its use and they also had
difficulty in using it but as time started passing people got to know about its
use and now they know about its use properly. Cameras and smart speakers both
of them are the few examples of this technology, it gives the convenience of
having a look in the certain areas or listening to different voices to the
owner if he or she is outside and someone tries to sneak in or even tries to
steal something in the office too.
According to some researchers, there are
some important negative impacts of hacking on the company. It can be noted that
hackers have a lot of reason for breaking into any network security of the
company. Moreover, there are different motives for hackers when they are going
to break the system security. But the main fact is that hacking is causing a
lot of damaging to different computer devices and businesses. One of the huge
negative impact of hacking to the company is related to the financial losses.
Every company will face, extreme financial losses due to such hacking acts. It
is showing that company may loss up to 300 million dollars due to hacking
problems. Furthermore, due to such losses the company will face extreme
financial problems and also not able to stay in the market for long period of
time. Another fact is that company will cost more money during repairing and
also tracking down the hackers.
Another one of the most important
negative impact is related to the loss of information. There are a lot of
companies in the market loss their important information due to hacking. This
is because hacking may result in loss of data because some file are replaced or
deleted during hacking. Moreover, in the last few years some servers Interpol,
FBI, Pentagon and NASA have been compromised their important data at different
points. Furthermore, another problem is that sometimes hackers may leak
important data from government organization and post it different website. Due
to this such companies are in huge trouble and also faced trouble in the
market.
Moreover, another negative impact is
related to the decreased in privacy. The company may facing some privacy issues
due to hacking. The main reason this that when hackers hacked the computer so
they can easily see whatever they wanted to. These hacker are able to extract
important and personal information of the company, related to customer data and
other important things. The main reason is that due to internet access, the
rate of privacy is extremely limited. This is because, the hacker can easily
access to the email, accounts, personal accounts. Through this the hackers can
gain important data from the company and destroy them badly.
It also caused huge damage to the
reputation to the company and also brand name. Whenever, any company is hacked,
the people started to decrease their trust towards that company. The main
reason is that they thought that the data is not secure. Moreover, whenever a
company is hacked so it will cause extreme damage to the lawsuits and other
initial repairing cost. Another fact is that if company losing their reputation
then it will be extremely dangerous for them to protect their future in the market.
The main reason is that customer don’t wanted to trust this brand and they
change it due to security problems in the data. One of the huge fact is that
companies are losing their businesses over the time.
Smart technologies include a variety of
monitors, sensors, and different devices that are connected and then work
together as well to make sure that automation is being enabled with the help of
remote control. Different sensors are available in all these appliances which
help to detect certain conditions in the environment like humidity. This
controlling function is provided by the software which is present on computing
devices like tablets or smartphones etc. All these smart technologies are
connected wirelessly by the use of standard communication methods. Their demand
is increasing day after day, they are being used professionally.
Every owner of the company wants to make
sure that their company is safe and this security is one of the biggest draws
towards automation, on average people, are investing approximately 47 billion
dollars on security and it clearly shows that people are conscious of their
security. People want to have peace of mind while working in the company.
4.3 Analysis of the cybersecurity challenges
An
analysis that has been done for this study is the SWOT analysis. SWOT stands
for Strength, weakness, opportunities, and threats and this SWOT analysis is a
kind of technology that helps in assessing all of these four aspects of a
company or business concerning the marine cybersecurity (see Figure 1 in
appendix).
The threat is not just a word but it
includes all those things that can negatively affect the business or any
company through the outside source. Before planning, always make sure to think
about the obstacles and hurdles one can face. Evolvement in technology is
forever a threat as well as an opportunity so one should think wisely before
using it. Always try to know what the competitors are trying to do or what are
they up to.
Another main objective for the related to
the SWOT analysis is to identify qualitatively and then evaluation is being
done further on. Through identification of all these factors, there are many
new constitutive strategies that one can develop on the terms of strengths,
elimination of different kinds of weaknesses, manipulating all of the
opportunities along with the counteracting of certain threats. Different
strategies along with weaknesses are being known as one of the internal factors
for the system and then opportunities along with the threats are being
identified as the external factors. This analysis is very important for the
analysis of both the internal as well as the external factors for obtaining the
systematic approaches and further supports for the outstanding strategy
formulation.
Security is not just outside protection
but it also refers to the security of data and systems. Both kinds of
securities are equally important and they need to be managed accordingly.
Knowing about the security risks and how to deal with them can be much easier for
many of the owners as they become fail to identify the problem’s statement all
of a sudden. Before losing something big or having any of the major loss, it’s
better to take all the safety and security measures as soon as possible. This
will not only help in the protection but obviously can be much helpful to save
the owner from any kind of major loss. Different issues have been discussed in
this research along with the precautions which should be used.
It can be noted that there are number of
ways through which companies are able to protect their data from the hacker.
The first important way is that company has to change its password after every
6 hours. Due to this hacker will fact trouble during hacking the important data
of companies. The marine industry is also able to change its passwords after
every 6 hours. The next this is that they have to consider the passwords
strength too. If a password is weak then it could be easily assess by the
hackers easily.
Another important trick for the company
is related to the right ISP. If a company contains a right ISP then it means
that company creates a strong castle for the network security. It is not easy
for anyone to extract information from the computer. Moreover, there are also
some plethora of service provider in the market. Due to this marine industry
can easily choose the right internet package that will protect their data from
hacking. On the other hand, the next tip is related to keeping eye on the spy.
Due to this fact, the antivirus software will keep on updating the antivirus
software programs in a perfect way. Moreover, marine industry can easily
protect their data from the hacker if they started to encrypt personal data.
This is because due to this technology it will become extremely easy and
valuable to protect the data from hacker. Technology is increasing day after
day due to which all such issues of cybersecurity in the marine areas are also
increasing on a large scale. Because of the increased technology, there are
most of the systems that are moving towards the online structure. Malware is a
virus that can easily damage all the systems and data can be easily leaked out.
Through this hacker can also gain access to all of the private information and
can be threatened full for company. So, this anti-malware policy for sure needs
to be applied. Due to this it will become extremely simple for the marine
industry to protect their important data from the hackers in a perfect way. The malware technology is also latest in the
market and providing a lot of advantages to the different companies.
Chapter
5:
5.
CONCLUSIONS AND RECOMMENDATIONS
5.1 Introduction of the cybersecurity challenges
As we have already discussed in the introduction
part that the marine cyber risks are increasing drastically day after day.
Every kind of industry in the whole globe is facing such issues of cybercrime-related
to the shipping industry and marine. Technology is increasing day after day due
to which all such issues of cybersecurity in the marine areas are also
increasing on a large scale. Because of the increased technology, there are
most of the systems that are moving towards the online structure. This is
another reason for the huge risk of cybersecurity in the marine industry. One
other thing which can be noted here that there are certain consequences as well
that are associated with data breaching. These issues need to be resolved by
the industries or else they will lose a major portion of their important data
and many other companies or industries would take advantage of all the data.
5.2
Conclusion of
the cybersecurity challenges
To overcome all of these risks and
challenges, the industries are required to be very careful about securing their
data. This is because if industry lost any data then it is useless for the
company. Many rivalry industries are always in a look to find some points
against the other industry so to avoid all of them cybersecurity is very useful
and impactful as well. But there is nothing perfect in the whole world; these
industries face several different problems, as well as some, are so big enough
that they might feel difficult to manage it. Next is some industries don’t have
enough of the money to get them installed in their industries so each situation
varies from one another but we have studied so much about the marine cyber risks
and challenges along with some research methodology as well through which we
tried to know that how much people or industries are there who face such
issues. If things are being managed accordingly and with the correct time, then
there won’t be any difficulty in future times at all.
5.3
Recommendations of
the cybersecurity challenges
As it has been discussed above that small
industries are not in a position to install such an expensive system so we
believe that they should look for the system that is in their budget because
the price of this system varies like other products or systems in the markets
as well.
Therefore, many big industries feel it
difficult to install them because they think this marine cybersecurity won’t be
able to cover the whole industry. Well for this they can have more than one
system for cybersecurity in their industries to manage every area and keep them
safe and secured. This means that companies are required to secure their data
with perfection. This is because if they are losing data due to cybercrime
issue then it will become extremely difficult for the company to stay in the
market.
The digitalization of this shipping
sector has enabled most of the information about different shipping industries
to get stored in cyberspace. As the ships are being connected to the satellites
continuously, chances are much high for the unauthorized entry when network
security is weak. To avoid all such breaches related to security, it is very
important to install this cybersecurity.
Anti-malware policy needs to be applied
for the defence of all the data of the shipping industry and to protect all the
data or details of the ship. Malware is a virus that can easily damage all the
systems and data can be easily leaked out. Through this hacker can also gain
access to all of the private information and can be threatened full for
company. So, this anti-malware policy for sure needs to be applied.
All of the shipping industries need to
make sure about the proper policies along with the certain actions that take
place in any of the cyber-attack. The threat needs to be contained soon even in
the initial stage. It is very important to scout all of the files for the
potential leaks or threats so in return proper measures can be used for the
defending of different ships against all of them.
People that are on board and the shore as
well need to be fully aware of all the activities that are on the ship. All the
crew needs to be fully trained at how to deal with it in case of any threat.
For the assessment of risk, Cybersecurity
as well as the IT crew needs to monitor all of the records of ships and the
different networks without any gap.
Increased marine cyber risks and the lack
of cybersecurity is shocking. It has been cited that almost only 12% of the
employees or staff on the ship receives some training about security and many
less industries have successfully installed this cybersecurity for the
protection of data. Many industries have been the victim of this cyber-attack.
By the increase in the level of sophistication of the technology that is being
used on-board along with the offshore for ships, it is very essential to
protect the network of all such ships from any kind of cyber-attack. Therefore,
this cybersecurity is very useful in today’s era and it needs to be implemented
by the marine industry.
References of the cybersecurity challenges
Abkowitz, M. D., 2011. An Application of
Enterprise Risk Management in The Marine Transportation Industry. pp. 221 -
232. [Book]
(Amoroso, E., 2012. Cyber Attacks:
Protecting National Infrastructure, STUDENT EDITION. illustrated Edition ed.
s.l.:Elsevier.) [Book]
Cook, A., Smith, R. & Janicke, L. M.
&. H., 2016. Measuring the Risk of Cyber Attack in Industrial Control
Systems. Proceedings of the 4th International Symposium for ICS & SCADA
Cyber Security Research (ICS-CSR 2016), pp. 23-25 . [Book]
(cyberdefensemagazine, 2019. Some counter
measures of cyber attack. [Online]
Available at: https://www.cyberdefensemagazine.com/some-countermeasures-to-cyber-attacks/)
DiRenzo, J., 2010. The Little-known
Challenge of Maritime Cyber Security. pp. 1-5. [Book]
Jones, K., 2015. Threats and Impacts in
Maritime Cyber Security. pp. 1-3. [Book]
(Kazan, H., 2016. Contemporary Issues in
Cybersecurity. Journal of Cybersecurity Research (JCR), 1(1).) [Book]
Knowles, W., Prince, D., Hutchison, D.
& Jones, J. F. P. &. K., 2015. A survey of cyber security management in
industrial control systems. International Journal of Critical Infrastructure
Protection, Volume 9, pp. 52-80. [Book]
Lobo-Guerrero, L., 2012. LLOYD'S AND THE
MORAL ECONOMY OF INSURING AGAINST PIRACY. 5(1), pp. 67-83. [Book]
Scully, T., 2014. The cyber security
threat stops in the boardroom. Journal of Business Continuity & Emergency
Planning, 7(2), pp. 138-148. [Book]
Skjong, E., 2016. Past, Present, and
Future Challenges of the Marine Vessel’s Electrical Power System. 2(4), pp.
522-537. [Book]
Tam, K., 2012. Threats and Impacts in
Maritime Cyber Security. pp. 1-13. [Book]
Tucci, A. E., 2013. Cyber Risks in the
Marine Transportation System. pp. 113-131. [Book]
Abkowitz, M. D., 2011. An Application Of
Enterprise Risk Management In The Marine Transportation Industry. pp. 221 -
232. [Book]
(Amoroso, E., 2012. Cyber Attacks:
Protecting National Infrastructure, STUDENT EDITION. illustrated Edition ed.
s.l.:Elsevier.) [Book]
(cyberdefensemagazine, 2019. Some counter
measures of cyber attack. [Online]
Available at: https://www.cyberdefensemagazine.com/some-countermeasures-to-cyber-attacks/)
DiRenzo, J., 2010. The Little-known
Challenge of Maritime Cyber Security. pp. 1-5. [Book]
Jones, K., 2015. Threats and Impacts in
Maritime Cyber Security. pp. 1-3. [Book]
(Kazan, H., 2016. Contemporary Issues in
Cybersecurity. Journal of Cybersecurity Research (JCR), 1(1).) [Book]
Knowles, W., Prince, D., Hutchison, D.
& Jones, J. F. P. &. K., 2015. A survey of cyber security management in
industrial control systems. International Journal of Critical Infrastructure
Protection, Volume 9, pp. 52-80. [Book]
Lobo-Guerrero, L., 2012. LLOYD'S AND THE
MORAL ECONOMY OF INSURING AGAINST PIRACY. 5(1), pp. 67-83. [Book]
Scully, T., 2014. The cyber security
threat stops in the boardroom. Journal of Business Continuity & Emergency
Planning, 7(2), pp. 138-148. [Book]
Skjong, E., 2016. Past, Present, and
Future Challenges of the Marine Vessel’s Electrical Power System. 2(4), pp.
522-537. [Book]
Tam, K., 2012. Threats and Impacts in
Maritime Cyber Security. pp. 1-13. [Book]
Tucci, A. E., 2013. Cyber Risks in the
Marine Transportation System. pp. 113-131. [Book]
·
Appendix i
Figure 1: Representation of SWOT
Analysis