Today, we are indeed all linked to each other by the Internet; we are using smartphones, tablets, laptops, and desktop computers. The Internet and digital data sharing, is not designed to be secure but to be open and accessible. Accessibility however, comes with threats, risk to data, risk to infrastructure security, and risk to system’s controls. The phrase cyber threat has become our reality.
By sea, 90% of the goods transported around the planet are by oil tankers and container vessels that travel our oceans (Wagstaff, 2014). The ships’ crews get smaller and ships get larger as we focus technology on automation, remote monitoring, and navigational systems, these can be cyber attacked. Researchers from the University of Texas verified that it was possible to change a ship's direction by simulating a GPS signal to target a ship’s onboard navigation system (Schmidt, 2015). Somali pirates are surfing the Internet for information that can help them with targeting vulnerable and valuable ships (Cyber; Information Security; Crime; Maritime, 2016). Pirates have the ability to access databases, which gives them access to a ship’s blueprints. Once they have the blueprints, they know where the ship is headed and what cargo is on board. (Klöcker, 2016).