- 1、本文档共30页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Cyber Risk Comite Maritime(网络风险拉西的海上)
Cyber Risk
A Joint Hull Committee paper in
conjunction with Stephenson Harwood
September 2015
Contents
EXECUTIVE SUMMARY 1
JHC CYBER RISK ASSESSMENT GUIDANCE 2
PART 1 - THE ANATOMY OF A CYBERATTACK 4
PART 2 – DEFENCES 8
PART 3 –THE ASSESSMENT OF RISK 12
APPENDIX 22
REFERENCES 26
Executive summary
An evolving issue
There is no single answer to the question of cyber exposure and the meaning of cyber as an
issue is often misunderstood. Leaving aside the Iranian centrifuges sabotaged at the design
stage, the only proven physical damage loss triggered by cyber to date has been at a German
smelting plant which was damaged when a safety device was disabled.
No identified systemic risk to ships
The risk of a loss to a ship as a result of cyber disruption is foreseeable, but is not yet a reality.
A systemic threat which could conceivably result in multiple losses on a scale which might
impact the solvency of the world’s insurers and reinsurers does not yet exist. For example,
even if electronic navigation systems were disabled, a ship would still be able to manoeuvre
and could either anchor or navigate using more traditional means (provided that the skills to do
so exist on board). There is time for owners and operators to plan and ensure that computer
systems on board ship and ashore are as secure as is reasonably practicable.
Growing exposure
Ships are mostly isolated units but as shipping embraces information technology, it becomes
exposed to cyber risks some aspects of which are already well known in retail and banking. As
the International Maritime Organisations E-Nav programme gains momentum, the technologies
required, as well as the aligned commercial demands of an ever more interconnected world,
will increase the exposure to loss as a result of a cyber attack or intrusion.
Specialised vulnerability
This report argues that the risk of loss or damage caused to or by a ship as
您可能关注的文档
- CompTIA Cloud+ Certification Exam Objectives (前年云+认证考试目标).pdf
- Computation of Rolling Stand Parameters by (滚动站参数的计算).pdf
- Computational Fluid Dynamics SwRI(计算流体动力学SwRI).pdf
- COMPUTATIONAL ANALYSIS AND DESIGN OF (计算分析和设计的).pdf
- Computational Fluid Dynamics (CFD) ESSIE(计算流体动力学(CFD)埃西).pdf
- Computational fluid dynamics hoffman solution (计算流体动力学霍夫曼的解决方案).pdf
- Computational Fluid Dynamics Modeling of (计算流体动力学建模的).pdf
- Computational Fluid Dynamics (CFD) (计算流体动力学(CFD)).pdf
- Computational Fluid Dynamics2 (CFDII)(计算流体Dynamics2(CFDII)).pdf
- Computational Geometry (Master Course ... Yazd(计算几何(硕士课程u2026).pdf
最近下载
- 中医气功学导论期末试卷.docx
- 请你谈一下你为什么要加入中国共产党谈谈为什么加入中国共产党.pptx VIP
- 2024南方电网广西电网公司校园招聘公开引进高层次人才和急需紧缺人才笔试参考题库(共500题)答案详解版.docx
- DB37T19976—2011山东物业服务规范第1部分住宅物业.doc
- 七年级心理健康教案完整版.docx
- 赤泥综合利用项目可行性研究报告(完整案例).pdf
- 2024款比亚迪海豹06DM-i豪华型尊贵尊荣尊享旗舰_用户手册驾驶指南车主车辆说明书电子版.pdf
- 企业技术改造资金绩效评价总结报告.doc
- 《生物化学》全套教学课件(共13章完整版).pptx
- 15-彭向刚-学习领导科学提升领导力(清华)__(全国各校课件参考).ppt
文档评论(0)