Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Dissertation on The Marine Cyber Risk Challenges and Security

Category: Engineering Paper Type: Dissertation & Thesis Writing Reference: HARVARD Words: 9400

Abstract of the cybersecurity challenges:

The cybersecurity challenges and related threats, issues, risks, and vulnerabilities are most challenging and harmful things, the world is facing now. These challenges and risks are consecutively growing and can be dangerous for the security of the networking systems and the confidential information saved in the databases. Marine Cyber risk security is among the most common issues in industries. Industrial managers are required to control and secure their important resources such as human resources and information resources. HR managers can control human resources issues in organizations. However, information resources are required to be controlled by the IT management in the Marine Industry. IT issues can result in data breaching and huge challenges. In this research work, research questions are developed to identify challenges and collect data for analysis.

Acknowledgment of The cybersecurity challenges:

We are thankful to our teachers and other faculty members who gave us this opportunity to complete this work. We are especially thankful to our research supervisor for our supervision during this project and ensure all-time support and concern. We have the honour to express our deep sense of gratitude to our teachers who enhanced our knowledge by cybersecurity and related risks because of which now we are capable of writing this research report. Their guidance, thoughtful discussions, and inspiring attitude at all times made it very easy for us to accomplish our work within the deadline. We are also thankful to our friends for their encouragement and assistance.

 Table of Contents

Marine Cyber Risk Challenges and Security. 1

declaration of academic integrity…………………………………………………………………………………………………………………….2

abstract……………………………………………………………………………………………………………………………………………………………6

acknowledgment……………………………………………………………………………………………………………………………………….......7Table of content …………………………………………………………….………………………………………………………………………………8

Executive summary ………………………………………………………………………………………………………………………………………..9

      list of figures……………………………………………………………………………………………………………………………………………10

      list of table ………………………………………………………………………………………………………………………………………………10

      table of abbreviations. …………………………………………………………………………………………………………………………… 10

       Chapter 1: 11

INTRODUCTION.. 11

       Chapter 2: 12

LITERATURE REVIEW... 13

       Chapter 3: 18

3.1       Introduction. 18

3.2       An argument for the research method. 19

3.3       The limitations of the research. 20

3.4       Ethical codes. 20

3.5       Sampling. 20

3.6       Conclusion. 21

       Chapter 4: 22

4.1       Introduction. 22

4.2       Findings. 22

4.3       Analysis. 23

Conclusion. 24

Chapter 5: 25

5.1       Introduction. 25

5.2       Conclusions. 25

5.3       Recommendations. 25

5.4       Conclusion. 26

References. 27

Appendix. 29

Questionnaire. 31

Marine industry

EXECUTIVE Summary of The cybersecurity challenges

The Marine Company is working in Oman. The key business operations of maritime are related to shipment and freight of goods. Following analysis, the company is having issues regarding its IT security system and cybercrimes control systems. Primarily focusing on this issue, research data are collected from the primary research audience by the use of a survey questionnaire technique. The questionnaire has consisted of several open-ended and close-ended questions for the research respondents and samples from the Marine Company. However, the targeted research population was from Oman. The collected data is analysed in light of the literature review to reach the conclusion. The whole research work concluded that cybercrime and data breaching is the biggest security challenges in Marine. Technological disaster is also issues concerning with the IT security systems. The whole research work concludes that hacking and data breaching can generate critical outcomes for the company if not managed properly. Among the highest risk factors, the one that concerns with cybersecurity is known as a malicious attack. Following research outcomes, automation is a contributing factor for cybersecurity risk factors as it enables other people to get remote access and make changes in the data. Considering current challenges and issues, marine management needs to identify possible solutions for the data security system. The shipping industry also needs to have an anti-malware policy to defend important data from external attacks and access.

·         List of figures

Figure 1: Representation of SWOT Analysis. 29

Figure 2: Three Steps of Analytic Hierarchy process

·         List of tables

Table 1: Abbreviations. 10

Table 2: Research question(s) 29

Table 3:Research Methods

·         Table of abbreviations 

Table: Abbreviations

Abbreviations

Full Word

IS

Information System

CSIA

Cyber Security And Information Assurance System

HR Manager

Human Resources Manager

DAC

Discretionary Access Control

MAC

Mandatory Access Control

RBAC

Role-Based Access Control

Chapter 1: 

INTRODUCTION of The cybersecurity challenges

In this project, there is brief information available on marine cybersecurity risks and its main challenges. Every industry in the world is struggling with cybercrime issues. The main problem is that cybercrime issues are increasing in the marine and shipping industry. Marines are facing a lot of problems during their missions because of cybersecurity risks. Therefore, it is required to analyse the main risks and challenges of cybersecurity that are related to the marine industry. This is because as technology is increasing the risk of cybersecurity is also enhancing. Due to this case, there is proper information about the risk related to the marine industry (Scully, 2014).

The main cause of this problem is that technology is increasing. Due to these many systems are moving towards the online structure. In that case, there will be challenges for CSIA in the industries. The main consequences will be related to data breaching. It can be noted that if these issues are not tackled by the industry then they may lose important data. Due to this, there will be a huge problem for this industry that can damage the foundation of the country. This is because the marine industry is extremely important especially for Oman. Some common software and systems to reduce external access are MAC, RBAC, and DAC.

This a relevant problem is for many years because many industries are facing. They don’t have such a system that can easily perfectly deal with cybercrime issues and IS challenges. Therefore, many industries are applying different and valuable tools for dealing with cybersecurity risks in an efficient way. The other industries are not able to tackle this problem due to many reasons. The first reason is that their infrastructure is extremely big that makes it more difficult. The next reason is related to the software technical team is not perfect. Due to these reasons, it will become extremely difficult for different industry to minimize the risk of cybersecurity.

It is also observed that this problem is related to the application of data breaching. This problem is related to cybercrime issues present in different industries of the world. Due to this fact, many companies in the world are losing their important data. This shows that this problem is related to networking attacks through the use of cybercrime issues (Amoroso, 2012).

This project is addressing the marine industry. This is because, from the past, it can be observed that this industry has gone through a high-quality transformation and changes in the past. Moreover, the main purpose of this industry is to grow in the form of an automation system. This is why it is considered to be the most important aspect of the marine industry. But the fact is that as technology is increasing in the marine industry there will be an increase in cybercrime threats. Due to this problem, it will become a huge challenge for the company. This study is addressing major challenges related to cybercrime in the marine industry (Kazan, 2016).

There are many members from some important industries will be interested in this project because it is considered as a global issue and first of all the government of the company. The main reason is that it is considered a global issue because there are many companies that are affected and it is damaging the economic condition of the country. The next thing is that important departments will be interested in this project because this department includes banks, defence, and health care centres. All of them will be interested in this project related to highlighting the challenges related to cybercrime.

Moreover, this problem is existing in every department of the world. It can be noted that any industry of the world that contains an online system to carry out different tasks of the industry will face such issues related to data breaching and other cybercrime issues. Due to this fact cybercrime is considered the most important challenge around the world also for the marine industry. This problem exists when different industries of the world are converted their system into automation. For this approach, their whole data is published online and there will be a high risk of losing their important data (Cook, et al., 2016).

Chapter 2:

LITERATURE REVIEW of The cybersecurity challenges

If any technology is used on a small scale, its issues and problems can also be small. But with time things become bigger and its related risks or threats will also become bigger and complicated. That's why individuals and companies must stay alert and come up with various countermeasures so that they can avoid cyber-attacks in the first place, and if they do happen, then they must have a plan to deal with those threats

Cybersecurity is one of the biggest concerns of recent times, and if considerable countermeasures will not be taken by stakeholders, then they may face severe consequences. The individuals, companies, and governments should come up with policies and systems to protect their data and sensitive information by developing and implementing above mentioned countermeasures because this is the only way to effectively deal with cybersecurity issues (cyberdefensemagazine, 2019).

As stated by Kazan (2016), the process to maintain as well as achieving secure cyberspace is very difficult and complex. Furthermore, it also concerns with intellectual property, sustainability, privacy, the critical infrastructure as well as the personal identity of the organization. The threats for making secure the operating infrastructure are profound serious such as cybercrime, cyber terrorism, and cyber espionage. Therefore, cyber-war for the kind of the technical community has responded with the procedures as well as safeguards and normally the private sector supplies. The whole study gives very brief information on the security within the cyber domain with the objective of the developing techniques of cybersecurity (Kazan, 2016).

Knowles et al. (2015) also described that it has identified by the dearth of the security metrics for the specific industrial control system as a hurdle for the implementation of this kind of methodology. Therefore, an agenda is outlined in the industrial security control system metrics for future research. To handle the fail-secure as well as a fail-safe of the industrial control system operations, the concept of functional assurance is also introduced (Knowles, et al., 2015). The main cause of this problem is that technology is increasing. Due to these many systems are moving towards the online structure. In that case, there will be a huge risk of cybersecurity issues in the industry. The main consequences will be related to data breaching. It can be noted that if these issues are not tackled by the industry then they may lose important data. Due to this, there will be a huge problem for this industry that can damage the foundation of the country. This is because the marine industry is extremely important especially for Oman

As described by Andrew E Tucci in his research on cybersecurity risks the relevant problem is for many years because many industries are facing. They don't have such a system that can easily perfectly deal with cybercrime issues. Therefore, many industries are applying different and valuable tools for dealing with cybersecurity risks in an efficient way. The other industries are not able to tackle this problem due to many reasons. The first reason is that their infrastructure is extremely big that makes it more difficult. The next reason is related to the software technical team is not perfect. Due to these reasons, it will become extremely difficult for different industries to minimize the risk of cybersecurity (Tucci, 2013). This project is addressing the marine industry. This is because, from the past, it can be observed that this industry has gone through a high-quality transformation and changes in the past. Moreover, the main purpose of this industry is to grow in the form of an automation system. This is why it is considered to be the most important aspect of the marine industry. But the fact is that as technology is increasing in the marine industry there will be an increase in cybercrime threats. Due to this problem, it will become a huge challenge for the company. This study is addressing major challenges related to cybercrime in the marine industry.

DaiRenzo (2010) also stated in his research study that there are many members from some important industries will be interested in this project because it is considered as a global issue and first of all the government of the company. The main reason is that it is considered a global issue because many companies are affected and it is damaging the economic condition of the country. The next thing is that important departments will be interested in this project because this department includes banks, defence, and health care centres. All of them will be interested in this project related to highlighting the challenges related to cybercrime. Moreover, this problem is existing in every department of the world. It can be noted that any industry of the world that contains an online system to carry out different tasks of the industry will face such issues related to data breaching and other cybercrime issues. Due to this fact cybercrime is considered the most important challenge around the world also for the marine industry. This problem exists when different industries of the world are converted their system into automation. For this approach, their whole data is published online and there will be a high risk of losing their important data (DiRenzo, 2010).

Explain Eskonj described that the risk and challenges of security occur all the time and it can’t be measured easily. The marine system needs good security systems for resolving the challenges and risks that occur in cybersecurity. Usually, the marine industry has been gone by using the incredible transformation in the last several years on a large scale. The major purpose of the industry growth is considered as automation and it is one of the most important reason aspects in the marine industry.  In the shipping industry, by increasing the automation the constant threats for the ships in cyberspace can be increased. This study is conducted to measure the challenges of the cyber in the marine.

The risk of cybersecurity is developing gradually and in various industries, these risks are grasping the era trends of the industry in effective manners. The cyber-attacks methods are engaged in changing constantly. To employ the mandatory measures of cybersecurity, it is increasingly difficult for preventing them. These are the good sources in the forms of cybersecurity for enhancing the systems and mechanism of the marine industry (Skjong, 2016).

Jones K.D states that several cyber-attacks can occur during the implementation of cybersecurity in the shipping industry.  A few of the important attacks are malware contamination, data breaches, invoice frauds and incidents of the ransomware. To protect the data on the servers of the ships for protection from various threats, it has become most important and essential. Any given enterprise can be protected by the cybersecurity against the numerous cyber-attacks. It also protects from unauthorized access for the particular computerized systems otherwise it can hack badly. Due to the rapid growth of technology; digitization is also embraced in the shipping or maritime industry. The various cost savings, as well as efficiencies, are embraces in the maritime industry as well and it all comes with it. In all of these aspects and perspectives, security can be often taken as for granted. Unfortunately, if such kinds of the system will be evolved than the numbers of the hackers can be enhanced and their methods are becoming more advanced with time. Such as; phishing emails are always required for the dawn of an email. (Jones, 2015).

            Tam (2012) also described their point of view and says that if any innovation is utilized from a more minor perspective then its issues can be little. The reason is very simple and basic for people and organizations to remain informed and always in search of different countermeasures.  So, they can maintain a strategic distance from cyber-attacks in any case, and if they occur, at that point they should have the arrangement to manage those dangers. Cybersecurity is probably the greatest worry of late occasions, and if impressive countermeasures won't be taken by partners, at that point they may confront extreme outcomes. The people, organizations, and governments should think of arrangements and frameworks to ensure their information and delicate data by creating and actualizing previously mentioned countermeasures since this is the best way to viably manage cybersecurity issues (Tam, 2012).

As expressed by Kazan (2016), the procedure to keep up just as accomplishing secure the internet is extremely troublesome and complex, just as it likewise worries with licensed innovation, supportability, protection, the basic framework just as the individual personality of the association. The dangers for making secure the working framework are significant just as genuine, for example, cybercrime, digital psychological warfare, digital undercover work just as a cyber-war for the sort of the specialized network has reacted with the strategies just as shields and ordinarily the private part supplies. The entire examination gives brief data on the security inside the digital space with the target of creating procedures of cybersecurity. This a pertinent issue is for a long time because numerous ventures are confronting. They don't have such a framework that can without much of a stretch superbly manage the cybercrime issues.

Accordingly, numerous ventures are applying extraordinary and significant instruments for proficiently managing digital security chances. Different enterprises can't handle this issue because of numerous reasons. The main explanation is that their foundation is amazingly enormous that makes it progressively troublesome. The following explanation is identified with the product specialized group that isn't great. Because of these reasons, it will turn out to be very hard for diverse businesses to limit the danger of digital security. This undertaking is tending to the marine business. This is because, from the past, it very well may be seen that this industry has experienced a top-notch change and changes before. Also, the principal motivation behind this industry is to develop as a computerization framework. This is the reason it is viewed as the most significant part of the marine business. Yet, the truth of the matter is that as innovation is expanding in the marine business there will be an expansion in cybercrime dangers (Kazan, 2016).

Knowles et al. (2015) likewise depicted that it has distinguished by the lack of security measurements for the particular modern control framework as an obstacle for the execution of this sort of technique. Consequently, a plan is sketched out in the mechanical security control framework measurements for future research. To deal with the come up short secure just as a safeguard of the modern control framework activities, the idea of useful affirmation is likewise presented. The primary driver of this issue is that innovation is expanding. Because of these numerous frameworks are moving towards the online structure. All things considered, there will be a tremendous danger of digital security issues in the business. The fundamental results will be identified with information breaking. It tends to be noticed that on the off chance that these issues are not handled by the business, at that point they may lose significant information. Because of this, there will be a colossal issue for this industry that can harm the establishment of the nation. This is because the marine business is critical particularly for Oman.

Because of this issue, it will end up being a colossal test for the organization. This examination is tending to significant provokes identified with cybercrime in the marine business. There are numerous individuals from some significant businesses that will be keen on this venture since it is considered a worldwide issue and as a matter of first importance the legislature of the organization. The primary explanation is that it is considered as a worldwide issue because there are numerous organizations are influenced and it is harming the financial state of the nation. Interestingly, significant offices will be keen on this undertaking since this division incorporates banks, barriers, and medicinal services places. Every one of them will be keen on this task identified with featuring the moves identified with cybercrime (Knowles, et al., 2015).

In this article, Lobo Gerorogy says that Also, this issue is existing in each division of the world. It very well may be noticed that any industry of the world that contains an online framework to do various errands of the business will face such issues identified with information penetrating and other cybercrime issues. Because of this reality cybercrime is considered as the most significant test far and wide likewise for the marine business. This issue exists when various enterprises of the world are changed over their framework into computerization.

Lobo-Guerrero (2012) has also described in the study that their entire information is distributed on the web for this methodology. Besides, it will also be a high danger of losing their significant information because several security threats happen constantly which can't be estimated without the rise of any problem. The marine framework needs great security frameworks for settling the difficulties and dangers that happen in cybersecurity. For the most part, the marine business has been passed by utilizing the mind-boggling change over the most recent quite a long while everywhere scale. The significant motivation behind the business development is considered as computerization and it is one of the most significant explanation angles in the marine business. In the transportation business, by expanding the mechanization the consistent dangers for the boats on the internet can be expanded. This investigation is directed to quantify the difficulties of the digital in the marine (Lobo-Guerrero, 2012).

Abkowitz use to say that the danger of the cyber security is growing slowly and in different enterprises, these dangers are getting a handle on the time patterns of the business in successful habits. The digital assault strategies are occupied with evolving continually. To utilize the compulsory proportions of cybersecurity, it is progressively hard for forestalling them. These are the acceptable sources in the types of cybersecurity for improving the frameworks and component of the marine business there are a few digital assaults that can happen during the usage of cybersecurity in the delivery business. A couple of the significant assaults are malware tainting, information penetrates, receipt cheats, and occurrences of the ransomware. To secure the information on the servers of the boats for insurance from different dangers, it has gotten generally significant and basic.

Some random undertaking can be secured by cybersecurity against the various digital assaults. It additionally shields from unapproved access for the specific automated frameworks else it can hack gravely. Because of the quick development of innovation; digitization is additionally grasped in the delivery or sea industry. The different cost investment funds, just as efficiencies, are grasps in the sea business too and everything accompanies it. In these viewpoints and points of view, security can be regularly underestimated as. Shockingly, if such sorts of the framework will be developed than the quantities of the programmers can be upgraded and their strategies are getting further developed with the progression of time. For example, phishing messages are constantly required for the beginning of an email (Abkowitz, 2011).

Chapter 3:

 

RESEARCH METHODOLOGY & DATA COLLECTION

3.1   Introduction of The cybersecurity challenges

In this section, the research methodology on the cybersecurity risk and challenges is discussed that is telling that it is the process or technique which is being used for the identification, selection, processing, and analysing all of the information related to a particular topic. Here in this part of the research, methodology, we are going to find out the challenges that are being faced by the people related to marine cybersecurity. The research methodology is particularly of four different types but here we are using quantitative research.

Quantitative surveys: It is the kind of survey in which the researcher may pose the same kinds of questions, mostly in the written form towards the sample pieces. The same set of questions is being asked from a different group of people from different areas and different age groups so that different answers can be obtained. (Thompson, 2018)

Research methodology in this topic is being done by the help of a quantitative survey, now the quantitative survey is much different from the qualitative survey and other different kinds of surveys. Here in this area, questionnaires are part of a quantitative survey.

Many people may think that the questionnaire survey is much easy as compared to the other research but in actual it isn’t, because in the questionnaire survey there is the number of different questions is supposed to be made according to the topic and keeping in mind about the age, gender, and area of the people who will be part of the research.

Here in this area, after doing or undergoing and reviewing different articles that have been discussed in the literature review above, a questionnaire was being prepared that contained all of the factors that have been mentioned in the upper area, 

       What is the list of challenges that are being faced by the people associated with cybersecurity?

       Does this word Cybersecurity scare you?

       What are the samples of the problems which you have faced because of this cybersecurity?

These were some of the questions that made part of the questionnaire along with the open-ended questions as well. Where suggestions were being given by the audience. All the questions in the questionnaire weren’t closed-ended whose answers could only be “Yes, No or Maybe”. If only closed-ended questions become part of the questionnaire, then there is no use of doing the survey and getting the information. Open-ended questions are being mentioned or used particularly so that audience can tell about their opinions and the maker of the questionnaire or the one behind the research can come up with several different ideas because when variety comes in answering then the questions’ results come uniquely and it gives a good impression too. It also becomes much easier to interpret the results differently

All these factors were then grouped into three different kinds of variables that are being commonly named as financial factors, technological factors along with policy and procedure formalities factors.

We were facing huge problem regard distribution   the questionnaire by website for Martine IT services due to pandemic corona, it was difficult for them to access and distribute the questionnaire for staff related to crowded emails and they stuck in other issue related to staff home quarantine. And we did not receive any reply or data from them.

3.2   An argument for the research method of The cybersecurity challenges

In this research, a purposive sampling methodology is the one that was being used. Now to make readers aware that what purposive sampling methodology is? So it is also known as selective, judgmental, or subjective sampling as well. It is one of the types which is non-probability sampling in which the researchers completely rely upon their thinking or the judgment while choosing the members of a population to get participation in their study. The most important factor or reason to use purposive sampling is to have focus on the specific characters of the population living in a particular area from where the research is being done or data is about to be collected. This population helps out to answer the questions that are most suitable and are useful for the research as well. So here, it is a choice that is being made up or the purpose which fluctuates depending upon the kind of purposing sampling technique that is being sued. In this methodology, as talked above questionnaire is the best kind (Ahokas). See table 2 and table 3 (in appendix) which represent various methodologies used in the research project for literature review, data collection, and analysis. Considering the situation and security issues of marine companies, it is possible to conduct questionnaires as we can reach all the companies, and extracting conclusions without reaching wide data can induce an impact on the results. Moreover, the best alternative is to consider the literature review and data provided by the department of government. 

Well using the well-defined and elaborated data of the questionnaire was being collected from the number of different people from different companies that have been the victims of cybersecurity or the companies who are taking precautionary measures for this cybersecurity. All of the members were being connected with the help of social media. All the members were supposed to be collected in a particular area so that the information could be obtained from them by all possible means. After getting in contact with them through the help of social media, all members were given appointments so that no hustle-bustle was made. All of the members were approached personally and after approaching them, the questionnaire was showing them. They were not only given the questionnaire to answer the questions on their no matter whether they understood it or not? This is because questionnaires are explained by students. It is considered as best way to answer all quarries. So, every part was discussed to get the best answers and responses because most of the efforts were being done in making the questionnaire and a single wrong answer could disturb all the results easily. This project was not an easy method because it took a lot of effort to make out the questionnaires. Many people were afraid that why the data is being collected from them and they also got afraid and completely refused to answer the questions as they thought their name would get public on different social media platforms along with the answers.  In previous studies, many researchers found difficulty in answering the questions. The questions in the questionnaire do not clear all the conditions and what to answer and what to not. So, the method is not an easy procedure at all to justify and make all the people relaxed and easy. Moreover, I also understand that if your questionnaire is short and concise. Then the respondents are showing honest response according to these questions. Furthermore, if questionnaire is not short, then respondents will not pay any kind of attention to the questions. Therefore, no honest response will be obtained through this questionnaire.

3.3   The limitations of the research of The cybersecurity challenges

Like every other research, we also have some of the limitations of our research.

At first, it was being thought it would be better to collect the number of different people from different areas as research results would be way better as it depends upon the sample size and opinions of different people but over time we realized sample size shouldn’t be too much nor it should be too less. This should be in between to make sure the results come out perfectly.

The next one is the time limit, it was very less and in whole this wasn’t that much easy to manage out all of the things together in such a limited period.

The next limitation is data people were being contacted through the use of social media and it wasn’t a good data collection process at all. One should always try to approach the people who are close and near to them.

3.4   Ethical codes of the cybersecurity challenges

Ethical codes for the research are: (Slowther, 2006)

       Honesty, we have reported all of the data and results with honesty without making anything false.

       Integrity. we have tried to keep up with their promises and agreements.

       Confidentiality is the part where it is necessary to protect all of the confidential communication and we made sure not to disclose the name of any person.

       Objectivity, we have strived to avoid all of the bias in the analysis of data, experimental design, and other steps as well.

       We respect each other as a colleague.

3.5   Sampling of the cybersecurity challenges

Sampling technique which we have used for our research methodology is the systematic sampling, in this kind of technique or sampling different people from whom data needs to be collected are organized in alphabetical order and then questionnaires were being filled up from them on their specified turn.

3.6   Conclusion of the cybersecurity challenges

In the conclusion of the research methodology it has been found out that it was really interesting to collect data about cybersecurity by using the quantitative survey as we came to know much more about the cybersecurity and the issues that are being affiliated with it and what people are facing.

Chapter 4:

FINDINGS & ANALYSIS

4.1   Introduction of the cybersecurity challenges 

Security is the basic need of every person these days. With the advancement of technology, the increase in threats is also increasing. Every company is motivated to do certain things and many of them become successful in no time. This is not the point here, the success makes every other person jealous and they start thinking negatively about the struggling company. Rival companies start making plans to hurt them and make their name bad in the market through all possible means. Here the basic thing which is required is the need for a proper security system that can’t only make the company safe but also the employees working in it. Every company should know in the beginning that how and through which means proper security can be given to their employees. Moreover, there are some important drawbacks of hacking for the company. It can be noted that due these hacking activities, the company will unable to stay in the market for a long period of time. The results are showing that such companies are not able to survive in the market because they loss data due to hacking. Moreover, in marine industry it is extremely important to save and protect data. The main reason is that through this data they can keep their secret and also product other people. If the secret data of marine industry is not save then it will create phenomenal problems for the company in the future.

 4.2   Findings of the cybersecurity challenges

Hacking of data or Cybercrime is one of the biggest security-related issues, especially in Marine Cybersecurity. Any hacker can sneak into the system and can have access to all the personal or private data without even letting anyone know at all. Cybersecurity is being used for the protection of data as we have learned by now, but here is the big major drawback that only large organizations are using it as they are more concerned about the security and privacy. They are afraid of hacking. Here we would like to suggest that small organizations should also apply this or use this security measure. It has made the lives easy for everyone as hackers can’t hack any important thing through the internet.

Technological Disaster is another security-related issue and can take place anywhere and at any moment. No one has control over this thing as this is technological related. But it doesn’t mean to leave it just the way it is without making it right. Different engineers should be a part of the team to have a check on the systems at regular intervals to know about any kind of the default in the system or anything like this. This can be of much help to prevent incidents in the future times.

There is a risk of malware that can spread into the system through a network. Malware can hijack operations of the software to use it for harmful purposes or to damage the reputation of the company. The company is also vulnerable to a risk of cyber-attack because it is using old software’s and the password security methods needs also needs attention. There is also the risk of phishing attacks which is can lead to leaking of sensitive information. Security and privacy regulations are one of the most threatening issues these days and it needs to be stopped. Anyone can sneak into the office or company and cause much harm to the employees and system as well. The interest of many people around smart technology has risen greatly since the last decade and still, many people eagerly want to know about this technology. When this smart technology was introduced, many of the employees and common people were not well aware of its use and they also had difficulty in using it but as time started passing people got to know about its use and now they know about its use properly. Cameras and smart speakers both of them are the few examples of this technology, it gives the convenience of having a look in the certain areas or listening to different voices to the owner if he or she is outside and someone tries to sneak in or even tries to steal something in the office too.

According to some researchers, there are some important negative impacts of hacking on the company. It can be noted that hackers have a lot of reason for breaking into any network security of the company. Moreover, there are different motives for hackers when they are going to break the system security. But the main fact is that hacking is causing a lot of damaging to different computer devices and businesses. One of the huge negative impact of hacking to the company is related to the financial losses. Every company will face, extreme financial losses due to such hacking acts. It is showing that company may loss up to 300 million dollars due to hacking problems. Furthermore, due to such losses the company will face extreme financial problems and also not able to stay in the market for long period of time. Another fact is that company will cost more money during repairing and also tracking down the hackers.

Another one of the most important negative impact is related to the loss of information. There are a lot of companies in the market loss their important information due to hacking. This is because hacking may result in loss of data because some file are replaced or deleted during hacking. Moreover, in the last few years some servers Interpol, FBI, Pentagon and NASA have been compromised their important data at different points. Furthermore, another problem is that sometimes hackers may leak important data from government organization and post it different website. Due to this such companies are in huge trouble and also faced trouble in the market.

Moreover, another negative impact is related to the decreased in privacy. The company may facing some privacy issues due to hacking. The main reason this that when hackers hacked the computer so they can easily see whatever they wanted to. These hacker are able to extract important and personal information of the company, related to customer data and other important things. The main reason is that due to internet access, the rate of privacy is extremely limited. This is because, the hacker can easily access to the email, accounts, personal accounts. Through this the hackers can gain important data from the company and destroy them badly.

It also caused huge damage to the reputation to the company and also brand name. Whenever, any company is hacked, the people started to decrease their trust towards that company. The main reason is that they thought that the data is not secure. Moreover, whenever a company is hacked so it will cause extreme damage to the lawsuits and other initial repairing cost. Another fact is that if company losing their reputation then it will be extremely dangerous for them to protect their future in the market. The main reason is that customer don’t wanted to trust this brand and they change it due to security problems in the data. One of the huge fact is that companies are losing their businesses over the time.

Smart technologies include a variety of monitors, sensors, and different devices that are connected and then work together as well to make sure that automation is being enabled with the help of remote control. Different sensors are available in all these appliances which help to detect certain conditions in the environment like humidity. This controlling function is provided by the software which is present on computing devices like tablets or smartphones etc. All these smart technologies are connected wirelessly by the use of standard communication methods. Their demand is increasing day after day, they are being used professionally. 

Every owner of the company wants to make sure that their company is safe and this security is one of the biggest draws towards automation, on average people, are investing approximately 47 billion dollars on security and it clearly shows that people are conscious of their security. People want to have peace of mind while working in the company.

4.3   Analysis of the cybersecurity challenges

An analysis that has been done for this study is the SWOT analysis. SWOT stands for Strength, weakness, opportunities, and threats and this SWOT analysis is a kind of technology that helps in assessing all of these four aspects of a company or business concerning the marine cybersecurity (see Figure 1 in appendix).

The threat is not just a word but it includes all those things that can negatively affect the business or any company through the outside source. Before planning, always make sure to think about the obstacles and hurdles one can face. Evolvement in technology is forever a threat as well as an opportunity so one should think wisely before using it. Always try to know what the competitors are trying to do or what are they up to.

Another main objective for the related to the SWOT analysis is to identify qualitatively and then evaluation is being done further on. Through identification of all these factors, there are many new constitutive strategies that one can develop on the terms of strengths, elimination of different kinds of weaknesses, manipulating all of the opportunities along with the counteracting of certain threats. Different strategies along with weaknesses are being known as one of the internal factors for the system and then opportunities along with the threats are being identified as the external factors. This analysis is very important for the analysis of both the internal as well as the external factors for obtaining the systematic approaches and further supports for the outstanding strategy formulation. 

Security is not just outside protection but it also refers to the security of data and systems. Both kinds of securities are equally important and they need to be managed accordingly. Knowing about the security risks and how to deal with them can be much easier for many of the owners as they become fail to identify the problem’s statement all of a sudden. Before losing something big or having any of the major loss, it’s better to take all the safety and security measures as soon as possible. This will not only help in the protection but obviously can be much helpful to save the owner from any kind of major loss. Different issues have been discussed in this research along with the precautions which should be used.

It can be noted that there are number of ways through which companies are able to protect their data from the hacker. The first important way is that company has to change its password after every 6 hours. Due to this hacker will fact trouble during hacking the important data of companies. The marine industry is also able to change its passwords after every 6 hours. The next this is that they have to consider the passwords strength too. If a password is weak then it could be easily assess by the hackers easily.

Another important trick for the company is related to the right ISP. If a company contains a right ISP then it means that company creates a strong castle for the network security. It is not easy for anyone to extract information from the computer. Moreover, there are also some plethora of service provider in the market. Due to this marine industry can easily choose the right internet package that will protect their data from hacking. On the other hand, the next tip is related to keeping eye on the spy. Due to this fact, the antivirus software will keep on updating the antivirus software programs in a perfect way. Moreover, marine industry can easily protect their data from the hacker if they started to encrypt personal data. This is because due to this technology it will become extremely easy and valuable to protect the data from hacker. Technology is increasing day after day due to which all such issues of cybersecurity in the marine areas are also increasing on a large scale. Because of the increased technology, there are most of the systems that are moving towards the online structure. Malware is a virus that can easily damage all the systems and data can be easily leaked out. Through this hacker can also gain access to all of the private information and can be threatened full for company. So, this anti-malware policy for sure needs to be applied. Due to this it will become extremely simple for the marine industry to protect their important data from the hackers in a perfect way.  The malware technology is also latest in the market and providing a lot of advantages to the different companies.

Chapter 5:

5. CONCLUSIONS AND RECOMMENDATIONS

5.1   Introduction of the cybersecurity challenges

As we have already discussed in the introduction part that the marine cyber risks are increasing drastically day after day. Every kind of industry in the whole globe is facing such issues of cybercrime-related to the shipping industry and marine. Technology is increasing day after day due to which all such issues of cybersecurity in the marine areas are also increasing on a large scale. Because of the increased technology, there are most of the systems that are moving towards the online structure. This is another reason for the huge risk of cybersecurity in the marine industry. One other thing which can be noted here that there are certain consequences as well that are associated with data breaching. These issues need to be resolved by the industries or else they will lose a major portion of their important data and many other companies or industries would take advantage of all the data.  

5.2   Conclusion of the cybersecurity challenges

To overcome all of these risks and challenges, the industries are required to be very careful about securing their data. This is because if industry lost any data then it is useless for the company. Many rivalry industries are always in a look to find some points against the other industry so to avoid all of them cybersecurity is very useful and impactful as well. But there is nothing perfect in the whole world; these industries face several different problems, as well as some, are so big enough that they might feel difficult to manage it. Next is some industries don’t have enough of the money to get them installed in their industries so each situation varies from one another but we have studied so much about the marine cyber risks and challenges along with some research methodology as well through which we tried to know that how much people or industries are there who face such issues. If things are being managed accordingly and with the correct time, then there won’t be any difficulty in future times at all.

5.3   Recommendations of the cybersecurity challenges

As it has been discussed above that small industries are not in a position to install such an expensive system so we believe that they should look for the system that is in their budget because the price of this system varies like other products or systems in the markets as well.

Therefore, many big industries feel it difficult to install them because they think this marine cybersecurity won’t be able to cover the whole industry. Well for this they can have more than one system for cybersecurity in their industries to manage every area and keep them safe and secured. This means that companies are required to secure their data with perfection. This is because if they are losing data due to cybercrime issue then it will become extremely difficult for the company to stay in the market.

The digitalization of this shipping sector has enabled most of the information about different shipping industries to get stored in cyberspace. As the ships are being connected to the satellites continuously, chances are much high for the unauthorized entry when network security is weak. To avoid all such breaches related to security, it is very important to install this cybersecurity.

Anti-malware policy needs to be applied for the defence of all the data of the shipping industry and to protect all the data or details of the ship. Malware is a virus that can easily damage all the systems and data can be easily leaked out. Through this hacker can also gain access to all of the private information and can be threatened full for company. So, this anti-malware policy for sure needs to be applied.

All of the shipping industries need to make sure about the proper policies along with the certain actions that take place in any of the cyber-attack. The threat needs to be contained soon even in the initial stage. It is very important to scout all of the files for the potential leaks or threats so in return proper measures can be used for the defending of different ships against all of them.

People that are on board and the shore as well need to be fully aware of all the activities that are on the ship. All the crew needs to be fully trained at how to deal with it in case of any threat.

For the assessment of risk, Cybersecurity as well as the IT crew needs to monitor all of the records of ships and the different networks without any gap.

Increased marine cyber risks and the lack of cybersecurity is shocking. It has been cited that almost only 12% of the employees or staff on the ship receives some training about security and many less industries have successfully installed this cybersecurity for the protection of data. Many industries have been the victim of this cyber-attack. By the increase in the level of sophistication of the technology that is being used on-board along with the offshore for ships, it is very essential to protect the network of all such ships from any kind of cyber-attack. Therefore, this cybersecurity is very useful in today’s era and it needs to be implemented by the marine industry.

References of the cybersecurity challenges

Abkowitz, M. D., 2011. An Application of Enterprise Risk Management in The Marine Transportation Industry. pp. 221 - 232. [Book]

(Amoroso, E., 2012. Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION. illustrated Edition ed. s.l.:Elsevier.) [Book]

Cook, A., Smith, R. & Janicke, L. M. &. H., 2016. Measuring the Risk of Cyber Attack in Industrial Control Systems. Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR 2016), pp. 23-25 . [Book]

(cyberdefensemagazine, 2019. Some counter measures of cyber attack. [Online]
Available at: https://www.cyberdefensemagazine.com/some-countermeasures-to-cyber-attacks/)

DiRenzo, J., 2010. The Little-known Challenge of Maritime Cyber Security. pp. 1-5. [Book]

Jones, K., 2015. Threats and Impacts in Maritime Cyber Security. pp. 1-3. [Book]

(Kazan, H., 2016. Contemporary Issues in Cybersecurity. Journal of Cybersecurity Research (JCR), 1(1).) [Book]

Knowles, W., Prince, D., Hutchison, D. & Jones, J. F. P. &. K., 2015. A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, Volume 9, pp. 52-80. [Book]

Lobo-Guerrero, L., 2012. LLOYD'S AND THE MORAL ECONOMY OF INSURING AGAINST PIRACY. 5(1), pp. 67-83. [Book]

Scully, T., 2014. The cyber security threat stops in the boardroom. Journal of Business Continuity & Emergency Planning, 7(2), pp. 138-148. [Book]

Skjong, E., 2016. Past, Present, and Future Challenges of the Marine Vessel’s Electrical Power System. 2(4), pp. 522-537. [Book]

Tam, K., 2012. Threats and Impacts in Maritime Cyber Security. pp. 1-13. [Book]

Tucci, A. E., 2013. Cyber Risks in the Marine Transportation System. pp. 113-131. [Book]

 

Abkowitz, M. D., 2011. An Application Of Enterprise Risk Management In The Marine Transportation Industry. pp. 221 - 232. [Book]

(Amoroso, E., 2012. Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION. illustrated Edition ed. s.l.:Elsevier.) [Book]

(cyberdefensemagazine, 2019. Some counter measures of cyber attack. [Online]
Available at: https://www.cyberdefensemagazine.com/some-countermeasures-to-cyber-attacks/)

DiRenzo, J., 2010. The Little-known Challenge of Maritime Cyber Security. pp. 1-5. [Book]

Jones, K., 2015. Threats and Impacts in Maritime Cyber Security. pp. 1-3. [Book]

(Kazan, H., 2016. Contemporary Issues in Cybersecurity. Journal of Cybersecurity Research (JCR), 1(1).) [Book]

Knowles, W., Prince, D., Hutchison, D. & Jones, J. F. P. &. K., 2015. A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, Volume 9, pp. 52-80. [Book]

Lobo-Guerrero, L., 2012. LLOYD'S AND THE MORAL ECONOMY OF INSURING AGAINST PIRACY. 5(1), pp. 67-83. [Book]

Scully, T., 2014. The cyber security threat stops in the boardroom. Journal of Business Continuity & Emergency Planning, 7(2), pp. 138-148. [Book]

Skjong, E., 2016. Past, Present, and Future Challenges of the Marine Vessel’s Electrical Power System. 2(4), pp. 522-537. [Book]

Tam, K., 2012. Threats and Impacts in Maritime Cyber Security. pp. 1-13. [Book]

Tucci, A. E., 2013. Cyber Risks in the Marine Transportation System. pp. 113-131. [Book]

·      Appendix i


Figure 1: Representation of SWOT Analysis

 

 


Figure 2: Three Steps of Analytic Hierarchy process


Table: Research question(s)

Sub Question No

Method

Strategy

What is the impact of unauthorized access on the cybersecurity?

 

 

 

 

Quantitative

 

Descriptive

 

And/or

 

Exploratory

What are the suspicious activities in the IT industry?

What is the significance of the security measures for cybersecurity?

 

Table:Research Methods

Main Question

 

No

Questions

Source

Method

Strategy

1

Introduction, information background, research question, theoretical framework.

Books, articles, websites

Desk Research

Descriptive

2

Literature reviews.

Books, articles, websites

Literature

Reviews

Descriptive

3

Research questions, methods.

Observation/survey

Desk Research

Descriptive

4

Finds, analysis, evaluation.

Observation/survey

Qualitative/ Quantitative

Exploratory

Explanatory

5

Conclusion, Recommendation.

Findings, analysis, literature review

Literature

Reviews support

 

Synthesis

Remarks

1- More questions can be generated based on the outcome.

2- Maneuvering space, mainstays, and companies’ visits can deviate the hypothesis. For a better end.


·        
Appendix II

Questionnaire

The purpose of conducting this survey is to meet up the objectives of this research. It will take almost 10 minutes to fill out this questionnaire. It is assumed that the information will be kept confidential and anonymous to others. For the completion of the research work, your assistance is required. All of your efforts are highly appreciated.

Age:  a) 18-24             b) 25-34 years             c) 35-44 years             d) 45 or above

Gender:  a) Male        b) Female

Educational Level: a) Bachelor           b) Masters     c) M-Phil       d) Others

Employment status: a) Private officials b) Government officials   c) Others    

For the said questionnaire five-points scale is used. It ranges from 1 to 5. Here, 

Strongly Disagree

1

Disagree

2

Neutral

3

Agree

4

Strongly Agree

5

Kindly provide your response for each of the given statements:

 

Sr.#

 

Statements

SD

1

D

2

N

3

A

4

SA

5

 

Marine industry

MI 1

Do you Invest in cybersecurity and cyber risk management?

 

 

 

 

 

MI 2

We have a closed system with an air gap between our network and outside influences

 

 

 

 

 

MI 3

I think our organization is the victim of a cyber-attack or incident

 

 

 

 

 

 

Legal: Statements related to Law and Administrations

 

AM1

Cyber-attacks issues on Administration and marine industry are covered by insurance.

 

 

 

 

 

AM2

Insurance of your company covers cyber-attacks or technological failures.

 

 

 

 

 

AM3

Cyber-attacks are considered as an important issue for the company

 

 

 

 

 

 

Policy: Statements related to guidelines and Soft Law

 

 

 

 

 

GS 1

It was necessary to establish new regulations for addressing cybersecurity issues.

 

 

 

 

 

GS 2

Actions or preventive measures are established in your company regarding cybersecurity.

 

 

 

 

 

 

Marine  Security

 

MS1

The marine community witnessed a number of front-page cybersecurity incidents

 

 

 

 

 

MS1

Maritime administration interact for maritime security issues with Law enforcement agencies

 

 

 

 

 

MS3

Present-day scenario there is a need to enhance Marine security

 

 

 

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

WRITING LAND

ONLINE

Writing Land

924 Orders Completed

Math Exam Success

ONLINE

Math Exam Success

1239 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed