1 / 13

The Role of Information Security In the enhancement of Maritime Security

The Role of Information Security In the enhancement of Maritime Security. By: Dr. Ahmed Kassar Arab Academy for Science, Technology and Maritime Transport. Introduction.

bertha
Download Presentation

The Role of Information Security In the enhancement of Maritime Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Role of Information SecurityIn the enhancement of Maritime Security By: Dr. Ahmed Kassar Arab Academy for Science, Technology and Maritime Transport

  2. Introduction Information security means protecting information and information system from unauthorized access, use, disclosure, disruption, modification or destruction. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or verbal communication and others.

  3. The Information Security Components

  4. The Information Security Components • Information confidentiality • Information Integrity • Information Availability

  5. Easy Information Easy Targeting

  6. Sensitive information • Sensitive information might include timing (e.g.…departure, arrivals), location of the ship, routes (routes, charts and etc.), crew nationality, ship/port survey, assessments, designs and architecture, security plans and emergency procedures

  7. Sources of Information • Personnel sources • Cryptographic, computer and satellites sources

  8. The threat • Piracy • Armed robbery against ships • Subversion • Espionage • Sabotage • Terrorism

  9. Other threats • Investigative journalism • Criminals • Disaffected or dishonest staff • Computer Hackers • Computer Viruses

  10. The shortcomings of using AIS in VTS systems • The shortcomings of using AIS in VTS systems “Every Body See Everybody”

  11. How information could be secured • Personnel security • Physical security • Cryptographic and computer security

  12. Recommendations • Shipping companies, port control stations and reporting systems should put clear policies concerning information security, and every one at shore or onboard a ship should be aware of the negative outcomes of information release and the possible ways of breaches and penetrations. Moreover, everyone concerned should know how information release could be used negatively to threaten the company interests or the company fleet itself. • The field of information security has grown and evolved significantly in recent years. As a career choice there are many ways of gaining entry into the field. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases,security testing, information systems auditing, business continuty planning and digital forensics science, to name a few.

  13. Thank You

More Related