Port Facility Cyber Security - Inter-American …portalcip.org/wp-content/uploads/2017/05/C04-Cyber...with industry, particularly during facility/vessel visits and meetings. • Everyone

Post on 30-Aug-2020

2 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

Transcript

U. S. COAST GUARD

MAR'01 1

Port Facility Cyber Security

International Port Security Program

Cyber Risk in the Marine Transportation System

U. S. COAST GUARD

Objectives

• IDENTIFY motivations behind a cyber attack.

• IDENTIFY various types of cyber incidents.

• DESCRIBE the relationship between cyber risk and the MTS.

• STATE why cyber security is important to ports and what steps should be taken.

U. S. COAST GUARD

Topics

• Why is cyber security important to ports?

• What are motivations behind a cyber-attack?

• What are various cyber threats that the MTS faces?

• Cyber security assessment.

• Cyber security plan.

• Managing cyber security at a port facility.

• Understand countermeasures

U. S. COAST GUARD

What is cyber security?

U. S. COAST GUARD

Cyber security defined

Cyber security can be defined as:

“the collection of tools, policies, security concepts, security safeguards, guidelines, risk

management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and

organization and user’s assets.”

U. S. COAST GUARD

Impacts of Exploiting Cyber in MTS

• Financial loss

• Terminal and / or port shutdowns

• Economic disaster

• Environmental catastrophes

• Loss of life

6

U. S. COAST GUARD

Cyber Examples

7

U. S. COAST GUARD

Hackers Used Cyber to Facilitate Drug Smuggling

By breaking into the offices of a harbor company, the criminals could install

key-loggers to take control of computers

Computers of container terminal were hacked so the containers that

contained drugs could be monitored

By means of false papers and a hacked pin code, the drivers were

able to pick up the container at a location and time of their choosing

1044 kilos cocaine/1099 kilos heroin

8

U. S. COAST GUARD

ECDIS Vulnerabilities

Electronic Chart Display and Information System (ECDIS)

• Used for ship navigation

• Interconnected with numerous shipboard systems and sensors (AIS, NAVTEX, Speed Log, fathometer)

• Chart updates loaded via internet or CD/USB

9

U. S. COAST GUARD

Cyber Attack – Cargo Data

• Target: Iranian Shipping Line (IRISL)

• Major data and communications loss

• Significant disruptions in operations

• Severe financial losses

• Cargo sent to incorrect destinations

10

U. S. COAST GUARD

Oil Rig Loss of Stability

11

• Semi-submersible drilling rig experienced power management system problems

• Power outage • Loss of station • Emergency disconnect • 14 different viruses • Significant safety concern

U. S. COAST GUARD

WiFi Devices

Recent studies have shown major vulnerabilities in 20% of identified control system networks

• Digital surveillance networks also have vulnerabilities

Powerful WiFi devices detected on foreign flag ships

• Many antennas have a range of several miles

• Several antennas connected to computers running password cracking software

U. S. COAST GUARD

2000 - Russia

• Hacked natural gas pipeline flow control system

• Largest non-nuclear explosion and fire

• 3 kiloton explosion (WTC on 9/11 ~ 0.1kiloton)

U. S. COAST GUARD

2001 - Texas

• Revenge hack • Port's web service inaccessible • Crucial data for shipping pilots, mooring companies and support firms

U. S. COAST GUARD

Cyber is an issue, what’s next?

15

• Levels of interaction/interest have varied throughout the world. • Cyber should be a topic in security discussions/interactions with industry, particularly during facility/vessel visits and meetings. • Everyone must get familiar with the resources that are available. • Cyber isn’t going away; we all need to be conversant. This isn’t just an IT issue anymore.

U. S. COAST GUARD

Authority & Jurisdiction

16

• Cyber is another operational domain. • Cyber is just an additional risk factor we must take into account when ensuring a safe and secure marine transportation system.

U. S. COAST GUARD

Cyber Threat Sources

Attack Motivators

Espionage

Terrorists

Criminal Hactivists

National Governments

U. S. COAST GUARD

Threat actors and vectors

U. S. COAST GUARD

Cyber security standards, guidance and best practices

There is a wide range of security-related standards and best practice guidance available that apply to IT and industrial control systems.

U. S. COAST GUARD

Cyber security assessment

• In compliance with the port security standards, security assessments are conducted for ports and port facilities.

• The purpose of these assessments are to identify vulnerabilities that may lead to a security incident.

• It is intended that wherever appropriate the CSA should build upon the existing security assessments.

U. S. COAST GUARD

Cyber security plan

• Security assessments form the basis of the security plans for the port and port facilities.

• Plans should address the issues identified in the relevant assessment through the establishment of appropriate security measures designed to minimize the likelihood of a breach of security and the consequences of potential risks.

• It is intended that wherever appropriate the CSP will build upon the existing port facility security plan (PFSP).

U. S. COAST GUARD

Cyber security training

• When employees aren’t involved in cybersecurity, not only can vulnerabilities and threats go unnoticed but employees can become conduits through which attacks are executed.

• Employees should receive initial and periodic cybersecurity training, helping to maintain the security of the organization as a whole.

• While cybersecurity is an expansive field, there are certain topics that should be emphasized for general awareness.

• Social engineering - continues to be a popular means for cyber criminals to prey upon unsuspecting employees.

U. S. COAST GUARD

Cyber security training

• Methods involve emails (“phishing”), phone calls, or other types of personal interactions in which malicious actors attempt to entice employees into providing sensitive personal or corporate information, such as account passwords or details about information technology infrastructure.

• Actors might attempt to make employees perform specific actions, such as pay for alleged services, download infected attachments, or visit malicious websites.

• Unsolicited emails, phone calls, and other correspondence from unknown senders should be viewed with particular caution.

U. S. COAST GUARD

Questions to consider

• Was cyber security considered when conducting the port facility security assessment (PFSA)?

• Does the port facility security plan (PFSP) address cyber security?

• Does the port facility test its IT system for weaknesses?

• Does the port facility conduct cyber security training for all facility personnel?

U. S. COAST GUARD

Basic Security Measures

1 Conduct a cyber security assessment

Assessments should identify: Important cyber assets and infrastructure. Risks arising from possible threats and the likelihood of their occurrence. Prioritized countermeasures. Weaknesses, including human factors, in the infrastructure, policies and

procedures.

Reference sources

Cyber Security Assessments

https://ics-cert.us-cert.gov/Assessments

Control System Internet Accessibility

https://ics-cert.us-cert.gov/alerts/ICS-ALERT-11-343-01A

Increasing Threat to Industrial Control Systems

https://ics-cert.us-cert.gov/alerts/ICS-ALERT-12-046-01A

U. S. COAST GUARD

Basic Security Measures

2 Develop a cyber security plan

Similar to the PFSA and PFSP the plan should include: Measures to secure cargo and ships stores data.

Methods of testing for weaknesses. A schedule of drills and exercises. A list of hardware, networks and personnel that have access to them.

Standard operating procedures.

Reference sources Beginners Guide to Firewalls: A Non-Technical Guide

https://portal.waterisac.org/system/files/2002__Library/Firewall%20Guide.pdf

Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies

https://ics-cert.us-cert.gov/Abstract-Defense-Depth-RP Targeted Cyber Intrusion Detection and Mitigation Strategies

https://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B

U. S. COAST GUARD

Basic Security Measures

3 Conduct cyber security training

Employees should receive initial and periodic cyber security training, helping to maintain the security of the organization as a whole.

Reference sources

Five Tips to Help Execute an Employee Training Program https://www.helpnetsecurity.com/2016/08/18/employee-training-

program/ Cybersecurity Questions for CEOs

https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdf

Choosing and Protecting Passwords

https://www.us-cert.gov/ncas/tips/ST04-002

U. S. COAST GUARD

Lesson Summary

Question: What are some of the impacts of a cyber attack in the maritime transportation system?

U. S. COAST GUARD

Impacts of Exploiting Cyber in MTS

• Financial loss

• Terminal and / or port shutdowns

• Economic disaster

• Environmental catastrophes

• Loss of life

29

U. S. COAST GUARD

Lesson Summary

• Question: Who are the threat actors and how can they attack our systems?

U. S. COAST GUARD

Threat actors and vectors

U. S. COAST GUARD

Lesson Summary

• Question: What are important steps that a port facility can take to improve their cyber security?

U. S. COAST GUARD

Questions

top related