Page 168 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 168

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        and removed a shipping container before it had been controlled by the port authorities. The case,
        of course, was not isolated, but when the investigative authorities managed to identify the crime,
        the investigative action contributed to seizing a record eight tonnes of cocaine with a street retail
        price of EUR 500 million which had been hidden in a container full of bananas from Ecuador.

        This attack was carried out using the method of social engineering and a malicious program
        sent via email. While in this particular case the intrusion was detected and certain countermea-
        sures were applied by the port authorities, they were unable to contain another intrusion where
        specific hardware (mini-computers hidden inside distribution power cords and external com-
        puter data storage) and recording components mounted on a computer keyboard were used.

        4.2 Infection of Software Leads to a Complete Shutdown of Port Operations

        At the end of June 2017, the Petya virus, which spread through the internet, affected computers
        in more than 65 countries. The Ukrainian computer virus quickly disrupted various computer
        systems and did not spare even the largest companies such as the Danish shipwright Maersk,
        which was crippled by the virus for a few days. Maersk’s downturn of several days caused
        damages of approximately $300 million. Although Petya was not a blackmail virus, it caused
        enormous damage as it was intended to erase data and disable the operation of various systems.

        4.3 Infection of System Software Causes Interference with Port Operations

        System software designed to carry out port operations can be destroyed by a malware infec-
        tion from the web which hacks into the most secured parts of computer memory, including its
        hardware, in the most cunning of ways. By taking full control of the system, it is possible to
        intercept all communications of its users over wired (Ethernet) and wireless networks (WiFi,
        UMTS, GPRS, Bluetooth etc.), and even carry out legally binding actions in their names, such
        as transfers of funds or entering into credit agreements through e-banking services or, last but
        not least, impeding port activities and even causing a work accident in the port.


        5  Cyber Security Challenges


        Based on various studies, it can be concluded that, in addition to physical damage insurance,
        the main challenges when trying to ensure the cyber security of ports are the following:
        -  Poor awareness and skills with regard to maritime information and cyber security,
        -  Lack of financial and other resources (e.g. cybersecurity experts) to ensure information
           security,
        -  The technical complexity of the port ecosystem,
        -  Finding the right balance between business efficiency and cyber security,
        -  The existence of outdated and vulnerable information systems,
        -  A lack of a regulatory framework for cybersecurity implementation,
        -  The interconnection of information technology (IT) and operational technology (OT),
        -  Security risks in the supply chain (lack of certificates, remote access of the supplier to
           the port, etc.),
        -  The heterogeneity of networks/systems,
        -  The involvement of all stakeholders in the provision of port cybersecurity,
        -  Cybersecurity does not keep pace with technological advances or developments and the
           emergence of new challenges related to the digital transformation of ports, etc.

       168
   163   164   165   166   167   168   169   170   171   172   173