Optimising Maritime Cybersecurity

Maritime security specialist Naval Dome has a new approach to managing the cybersecurity status of all protected systems onboard ships, allowing shipboard and shoreside staff to monitor and evaluate fleet-wide system data, even when they are offline. 

The Naval Dome Dashboard collects and collates all the data captured by the company’s multi-award-winning Endpoint cyber protection system for use either at the company’s HQ – where personnel can access both online and offline shipboard data – or onboard the vessel itself, to provide the master or chief engineer with a complete picture of the ship’s cyber status.

Naval Dome CEO Itai Sela says this approach is particularly suitable for ships fitted with multiple, complex technologies and can be tailored to the customers’ specific needs and can be integrated with existing dashboards. Once the Endpoint system has gathered information from navigation and machinery equipment, such as ECDIS, RADAR, MCS and other critical equipment onboard, the data is accessed via an easy-to-navigate Dashboard display on a PC.

The Naval Dome Dashboard gives an exact picture of the critical equipment status, allowing users to quickly determine the number of PC-based systems onboard each ship and which of them are protected.

A Cyber State section provides information on the number of cyber security anomalies detected (caused for example by GPS spoofing), while a Cyber Map pinpoints the geographical origin of cyber attack attempts as gathered from Naval Dome cyber data base.

If an anomaly alert is issued by the Naval Dome security system the Dashboard will enable the operator to assess how the crew reacted to the problem, pinpointing the precise location of a suspected event and detailing who was using the equipment at the time.

There are two ways in which to use the data.  Firstly, offline, as many critical systems are stand alone and accessed directly by those on the ship, it is important that head office personnel also have secure access to this information. When shoreside operators wish to assess the performance of critical systems, data can be uploaded from the Endpoint to Naval Dome’s secure cloud, from where it is available through the dashboard, allowing secure access to information from standalone systems.

“Use in narrow bandwidth satellite communication systems makes it a very cost-effective solution for displaying critical information, keeping the costumer online and up-to-date.” Sela explains.

For online use, the information available through the Dashboard enables the ship and shoreside crews to assess the cyber status of each ship and of the entire fleet, says Sela.

“Naval Dome knowhow offers multiple layers of protection and anomaly detection, the effectiveness of which has been proved by comparing systems protected by Endpoint with those which are not.

“In this way, secure use of onboard systems can be more efficiently monitored and lessons can be learned from the experience to further optimise fleet efficiency, ultimately, reducing the costs related to resolving non cyber events,”

“The aim is to let shipowners know the cyber status of their onboard systems without having to react in any way. It’s our problem to deal with the attack. Naval Dome can deliver a very smart system that does not require any training. With just one click, shipowners can see the cyber activities of their entire fleet and control it.”         

News by CSI:

You Might Also Read:

Maritime Cybersecurity Takes A Big Step Forward:

 

« Cyber Attacks On Business Are Surging
Revealed: Top Secret Israeli Hackers For Hire »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

Waterleaf International

Waterleaf International

Waterleaf provide advanced network and cybersecurity solutions - informed by data sciences. Transforming Connectivity, Security and Information for Municipalities, Government & Enterprise.

Sattrix Information Security

Sattrix Information Security

Sattrix Information Security helps small, mid, and large enterprises in the area of digital transformation with a focus on information security.

Enaviya Information Technologies

Enaviya Information Technologies

Enaviya offer a comprehensive set of manual and automated software testing services adhering to standard quality assurance for best practices and processes.