A Database Tracking Maritime Cyber Attacks

International researchers led by Professor Stephen McCombie at NHL Stenden University of Applied Sciences in the Netherlands have launched the Maritime Cyber Attack Database (MCAD), a database of incidents involving the worldwide maritime sector. 

The database lists more than 160 incidents which demonstrate the relevance and vulnerabilities of cyber security across the board in today’s maritime industry.

The database not only includes incidents affecting ships, but also ports and other global maritime facilities. 
The research group expects that the database will help raise awareness of cyber security in the industry and provide data for further research and more accurate simulations in this critical area. “The database is aimed at creating a safer world in which the Global Maritime Transportation System (GMTS) can respond to threats that will only increase in number and impact... With this public database, we are raising awareness of cyber incidents in the maritime sector and creating opportunities for further investigation by our research group, led by Stephen McCombie and our partners,” according to Peter Mulder, Director of the ICT & Creative Technologies academy at NHL Stenden:

One of the applications of the database is to develop simulations of maritime cyber incidents that are realistic and relevant, so that companies, organisations, and ports can prepare for attacks.

The research group will also use the MCAD to produce reports and research papers showing trends and results of detailed analysis on subsets of the data. “The database is not a one-off but will be regularly updated and supplemented. For the first investigation, we searched manually, but now we are developing with artificial intelligence (AI) to automate the identification of new incidents from open sources and find out more details about already known incidents.” Professor McCombie said

The research group expects the database will help improve cyber security awareness in the sector and provide data for further research and more accurate simulations in this critical area.

Port Technology:   Smart Maritime Network:   Transort&LogisticsME:    ITLN:   Safety4Sea:   Image: Mike Bird

You Might Also Read: 

Ransomware Trends In The Aviation & Maritime Industries:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Have We Become Complacent About The ‘Insider Threat’?
Generative AI Tools Help Criminals Launch More Sophisticated Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

ADVA Optical Networking

ADVA Optical Networking

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.