Optimising Maritime Cybersecurity

Maritime security specialist Naval Dome has a new approach to managing the cybersecurity status of all protected systems onboard ships, allowing shipboard and shoreside staff to monitor and evaluate fleet-wide system data, even when they are offline. 

The Naval Dome Dashboard collects and collates all the data captured by the company’s multi-award-winning Endpoint cyber protection system for use either at the company’s HQ – where personnel can access both online and offline shipboard data – or onboard the vessel itself, to provide the master or chief engineer with a complete picture of the ship’s cyber status.

Naval Dome CEO Itai Sela says this approach is particularly suitable for ships fitted with multiple, complex technologies and can be tailored to the customers’ specific needs and can be integrated with existing dashboards. Once the Endpoint system has gathered information from navigation and machinery equipment, such as ECDIS, RADAR, MCS and other critical equipment onboard, the data is accessed via an easy-to-navigate Dashboard display on a PC.

The Naval Dome Dashboard gives an exact picture of the critical equipment status, allowing users to quickly determine the number of PC-based systems onboard each ship and which of them are protected.

A Cyber State section provides information on the number of cyber security anomalies detected (caused for example by GPS spoofing), while a Cyber Map pinpoints the geographical origin of cyber attack attempts as gathered from Naval Dome cyber data base.

If an anomaly alert is issued by the Naval Dome security system the Dashboard will enable the operator to assess how the crew reacted to the problem, pinpointing the precise location of a suspected event and detailing who was using the equipment at the time.

There are two ways in which to use the data.  Firstly, offline, as many critical systems are stand alone and accessed directly by those on the ship, it is important that head office personnel also have secure access to this information. When shoreside operators wish to assess the performance of critical systems, data can be uploaded from the Endpoint to Naval Dome’s secure cloud, from where it is available through the dashboard, allowing secure access to information from standalone systems.

“Use in narrow bandwidth satellite communication systems makes it a very cost-effective solution for displaying critical information, keeping the costumer online and up-to-date.” Sela explains.

For online use, the information available through the Dashboard enables the ship and shoreside crews to assess the cyber status of each ship and of the entire fleet, says Sela.

“Naval Dome knowhow offers multiple layers of protection and anomaly detection, the effectiveness of which has been proved by comparing systems protected by Endpoint with those which are not.

“In this way, secure use of onboard systems can be more efficiently monitored and lessons can be learned from the experience to further optimise fleet efficiency, ultimately, reducing the costs related to resolving non cyber events,”

“The aim is to let shipowners know the cyber status of their onboard systems without having to react in any way. It’s our problem to deal with the attack. Naval Dome can deliver a very smart system that does not require any training. With just one click, shipowners can see the cyber activities of their entire fleet and control it.”         

News by CSI:

You Might Also Read:

Maritime Cybersecurity Takes A Big Step Forward:

 

« Cyber Attacks On Business Are Surging
Revealed: Top Secret Israeli Hackers For Hire »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

K7 Computing

K7 Computing

K7 provides antivirus and internet security products for business and home users.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.