Optimising Maritime Cybersecurity

Maritime security specialist Naval Dome has a new approach to managing the cybersecurity status of all protected systems onboard ships, allowing shipboard and shoreside staff to monitor and evaluate fleet-wide system data, even when they are offline. 

The Naval Dome Dashboard collects and collates all the data captured by the company’s multi-award-winning Endpoint cyber protection system for use either at the company’s HQ – where personnel can access both online and offline shipboard data – or onboard the vessel itself, to provide the master or chief engineer with a complete picture of the ship’s cyber status.

Naval Dome CEO Itai Sela says this approach is particularly suitable for ships fitted with multiple, complex technologies and can be tailored to the customers’ specific needs and can be integrated with existing dashboards. Once the Endpoint system has gathered information from navigation and machinery equipment, such as ECDIS, RADAR, MCS and other critical equipment onboard, the data is accessed via an easy-to-navigate Dashboard display on a PC.

The Naval Dome Dashboard gives an exact picture of the critical equipment status, allowing users to quickly determine the number of PC-based systems onboard each ship and which of them are protected.

A Cyber State section provides information on the number of cyber security anomalies detected (caused for example by GPS spoofing), while a Cyber Map pinpoints the geographical origin of cyber attack attempts as gathered from Naval Dome cyber data base.

If an anomaly alert is issued by the Naval Dome security system the Dashboard will enable the operator to assess how the crew reacted to the problem, pinpointing the precise location of a suspected event and detailing who was using the equipment at the time.

There are two ways in which to use the data.  Firstly, offline, as many critical systems are stand alone and accessed directly by those on the ship, it is important that head office personnel also have secure access to this information. When shoreside operators wish to assess the performance of critical systems, data can be uploaded from the Endpoint to Naval Dome’s secure cloud, from where it is available through the dashboard, allowing secure access to information from standalone systems.

“Use in narrow bandwidth satellite communication systems makes it a very cost-effective solution for displaying critical information, keeping the costumer online and up-to-date.” Sela explains.

For online use, the information available through the Dashboard enables the ship and shoreside crews to assess the cyber status of each ship and of the entire fleet, says Sela.

“Naval Dome knowhow offers multiple layers of protection and anomaly detection, the effectiveness of which has been proved by comparing systems protected by Endpoint with those which are not.

“In this way, secure use of onboard systems can be more efficiently monitored and lessons can be learned from the experience to further optimise fleet efficiency, ultimately, reducing the costs related to resolving non cyber events,”

“The aim is to let shipowners know the cyber status of their onboard systems without having to react in any way. It’s our problem to deal with the attack. Naval Dome can deliver a very smart system that does not require any training. With just one click, shipowners can see the cyber activities of their entire fleet and control it.”         

News by CSI:

You Might Also Read:

Maritime Cybersecurity Takes A Big Step Forward:

 

« Cyber Attacks On Business Are Surging
Revealed: Top Secret Israeli Hackers For Hire »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Commission Nationale de l'Informatique et des Libertés (CNIL)

Commission Nationale de l'Informatique et des Libertés (CNIL)

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Winslow Technology Group (WTG)

Winslow Technology Group (WTG)

Winslow Technology Group is a leading provider of IT Solutions, Managed Services, and Cybersecurity Services dedicated to providing exceptional business outcomes for our customers since 2003.

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.

Cyber Security Unity (CSU)

Cyber Security Unity (CSU)

Cyber Security Unity (formerly the UK Cyber Security Association) is a new global community which has been set up to help unite the industry and combat the growing cyber threat.