What Do You Do in case of Cyber Attack to a Ship?
Samir J Shah
45 years Expertise in Shipping and Logistics I Advisor in Customs, International Business, Freight Forwarding and Logistics I Concerned and Sensitive Educator I TEDx Speaker I Author I Policy Maker
You’re on the bridge, with the ship’s course shown on the digital display. But why is the ship continuing to turn west? Everything looks normal on the computer screens in the dark wheelhouse — but outside, the land is dangerously close. What’s going on?
Down in the engine room, workers report via radio that everything is normal, but they wonder why the bridge has changed course. The engines are revving and the ship is picking up speed. The engine room hasn’t done this. What now? It’s because of hacker took control of your ship.?
Cybersecurity is a hot topic
Companies that are exposed to these problems can experience significant financial consequences and damage to their reputation.
Now, responding to the question the answer is here. If hackers take control of your ship, it is a serious and potentially dangerous situation. Here are some steps that you can take to respond to such an incident:
1. Notify authorities
领英推荐
2. Isolate the affected system
3. Identify the source of the attack
4. Assess the damage
5. Develop a response plan
6. Inform crew: Inform the crew of the situation and provide them with guidance on how to respond to the attack.
It is important to note that responding to a cyber attack requires specialized expertise. You may need to seek the assistance of cybersecurity experts to help you contain the attack and prevent further damage.
CEO at Seawings Global Logistics
1 年Samir Bhai an interesting article indeed in today's times. The same could be articulated about an aircraft as well. Cybersecurity is imperative in almost all aspects of our lives in the current times. The younger minds of this generation could certainly provide very meaningful inputs in this subject. Hopefully your article could enlighten many on this subject in the maritime sector.