Optimising Maritime Cybersecurity

Maritime security specialist Naval Dome has a new approach to managing the cybersecurity status of all protected systems onboard ships, allowing shipboard and shoreside staff to monitor and evaluate fleet-wide system data, even when they are offline. 

The Naval Dome Dashboard collects and collates all the data captured by the company’s multi-award-winning Endpoint cyber protection system for use either at the company’s HQ – where personnel can access both online and offline shipboard data – or onboard the vessel itself, to provide the master or chief engineer with a complete picture of the ship’s cyber status.

Naval Dome CEO Itai Sela says this approach is particularly suitable for ships fitted with multiple, complex technologies and can be tailored to the customers’ specific needs and can be integrated with existing dashboards. Once the Endpoint system has gathered information from navigation and machinery equipment, such as ECDIS, RADAR, MCS and other critical equipment onboard, the data is accessed via an easy-to-navigate Dashboard display on a PC.

The Naval Dome Dashboard gives an exact picture of the critical equipment status, allowing users to quickly determine the number of PC-based systems onboard each ship and which of them are protected.

A Cyber State section provides information on the number of cyber security anomalies detected (caused for example by GPS spoofing), while a Cyber Map pinpoints the geographical origin of cyber attack attempts as gathered from Naval Dome cyber data base.

If an anomaly alert is issued by the Naval Dome security system the Dashboard will enable the operator to assess how the crew reacted to the problem, pinpointing the precise location of a suspected event and detailing who was using the equipment at the time.

There are two ways in which to use the data.  Firstly, offline, as many critical systems are stand alone and accessed directly by those on the ship, it is important that head office personnel also have secure access to this information. When shoreside operators wish to assess the performance of critical systems, data can be uploaded from the Endpoint to Naval Dome’s secure cloud, from where it is available through the dashboard, allowing secure access to information from standalone systems.

“Use in narrow bandwidth satellite communication systems makes it a very cost-effective solution for displaying critical information, keeping the costumer online and up-to-date.” Sela explains.

For online use, the information available through the Dashboard enables the ship and shoreside crews to assess the cyber status of each ship and of the entire fleet, says Sela.

“Naval Dome knowhow offers multiple layers of protection and anomaly detection, the effectiveness of which has been proved by comparing systems protected by Endpoint with those which are not.

“In this way, secure use of onboard systems can be more efficiently monitored and lessons can be learned from the experience to further optimise fleet efficiency, ultimately, reducing the costs related to resolving non cyber events,”

“The aim is to let shipowners know the cyber status of their onboard systems without having to react in any way. It’s our problem to deal with the attack. Naval Dome can deliver a very smart system that does not require any training. With just one click, shipowners can see the cyber activities of their entire fleet and control it.”         

News by CSI:

You Might Also Read:

Maritime Cybersecurity Takes A Big Step Forward:

 

« Cyber Attacks On Business Are Surging
Revealed: Top Secret Israeli Hackers For Hire »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

GreatHorn

GreatHorn

GreatHorn offers the only cloud-native security platform that stops targeted social engineering and phishing attacks on communication tools like O365, G Suite, and Slack.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

2021.AI

2021.AI

2021.AI serves the growing business need for full oversight and management of applied AI.