{"id":11093,"date":"2020-10-13T10:04:16","date_gmt":"2020-10-13T08:04:16","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=11093"},"modified":"2021-12-23T11:56:39","modified_gmt":"2021-12-23T10:56:39","slug":"connected-ships-security","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/","title":{"rendered":"Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities"},"content":{"rendered":"\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-20790d87      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\tTable Of Contents\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#from-the-theory-of-complex-systems-to-ship-security\" class=\"uagb-toc-link__trigger\">From the theory of complex systems to ship security<\/a><li class=\"uagb-toc__list\"><a href=\"#the-challenge-of-ship-security\" class=\"uagb-toc-link__trigger\">The challenge of ship security<\/a><li class=\"uagb-toc__list\"><a href=\"#the-problems-are-more-complex-than-bad-actors\" class=\"uagb-toc-link__trigger\">The problems are more complex than bad actors\u00a0<\/a><li class=\"uagb-toc__list\"><a href=\"#how-easy-is-it-to-hack-these-ship-systems\" class=\"uagb-toc-link__trigger\">How easy is it to hack these ship systems?\u00a0<\/a><li class=\"uagb-toc__list\"><a href=\"#how-is-the-maritime-industry-responding\" class=\"uagb-toc-link__trigger\">How is the maritime industry responding?\u00a0<\/a><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n<p class=\"eplus-qHEdgr\">When you think of ships and <span style=\"user-select: auto;\" id=\"urn:enhancement-f65e0338\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>, you&#8217;re probably thinking of boats attacked at sea by swarthy individuals waving machetes. But while this remains true, there&#8217;s also a <strong style=\"user-select: auto;\">more insidious way to attack ships &#8211; through their <span style=\"user-select: auto;\" id=\"urn:enhancement-4bc7816\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software\">software<\/span><\/strong>. <\/p>\n\n\n\n<p class=\"eplus-J24AZd\">Modern vessels are equipped with all kinds of <span style=\"user-select: auto;\" id=\"urn:enhancement-e5e572e6\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/electronics\">electronics<\/span>, to ease <span style=\"user-select: auto;\" id=\"urn:enhancement-78e9d9d7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/navigation\">navigation<\/span>, assist in manoeuvring and assist in the safety of the ship and its passengers. If these are not appropriately secured, they leave boats and ships vulnerable to attack. <\/p>\n\n\n\n<p class=\"eplus-avz8ts\">There&#8217;s also the challenge as with any <a style=\"user-select: auto;\" href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/blockchain-dev\/blockchain-data-security\/\">industrial IoT<\/a> (<strong style=\"user-select: auto;\">IIoT<\/strong>) of the need to navigate the vessel IT and OT divide and the  &#8211; even finding staff knowledgeable about both is difficult. <\/p>\n\n\n\n<p class=\"eplus-4zMADa\">Vincent Ossewaarde is a <span id=\"urn:enhancement-bba9543\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> Auditor at <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/fortytwo.nl\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fortytwo Security<\/a>. He&#8217;s also a watersport enthusiast and avid <span id=\"urn:enhancement-52591b72\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/research\">researcher<\/span> on marine <span id=\"urn:enhancement-f9d72df4\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/electronics\">electronics<\/span> and <span id=\"urn:enhancement-ba652afb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> in marine systems. I spoke to him before his talk at the upcoming <strong><span id=\"urn:local-annotation-446139\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/codemotion\">Codemotion<\/span> Online Tech Conference<\/strong>, which will be held in October 20202. If you want to discover more about Vincent&#8217;s and others&#8217; talks, check out the agenda <a href=\"https:\/\/events.codemotion.com\/conferences\/online\/2020\/codemotion-online-tech-conference\/\">here<\/a>: free tickets are still available!<\/p>\n\n\n\n<h2 class=\"eplus-J6dixu wp-block-heading\">From the theory of complex systems to ship security<\/h2>\n\n\n\n<p class=\"eplus-4GqCie\">Vincent graduated from the University of Amsterdam in the theory of complex <span style=\"user-select: auto;\" id=\"urn:enhancement-78ffd2a2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span> and specifically &#8220;<span style=\"user-select: auto;\" id=\"urn:enhancement-2c1f9e1b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span> that exploit a behaviour that&#8217;s not programmed into it.&#8221; He was provided with a military-grade <span style=\"user-select: auto;\" id=\"urn:enhancement-1607580c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> built for defence purposes and his <span style=\"user-select: auto;\" id=\"urn:enhancement-4cbca671\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/research\">research<\/span> focused on building a simulation system using a particular <span style=\"user-select: auto;\" id=\"urn:enhancement-2eb09d98\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/operating_system\">operating system<\/span> that was based on sharing resources like <span style=\"user-select: auto;\" id=\"urn:enhancement-cd0cd6ab\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/random-access_memory\">RAM<\/span> and <span style=\"user-select: auto;\" id=\"urn:enhancement-5713b005\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/central_processing_unit\">CPU<\/span>. <\/p>\n\n\n\n<p class=\"eplus-z9CMkh\">He recalls &#8220;The system was so well designed, that it&#8217;s being built for that using in weapon systems and later sold to a large defence contractor, and they built it into fighter jets and missile systems on ships.<\/p>\n\n\n\n<p class=\"eplus-BS3qtm\">He later met a job applicant for Fortytwo <span id=\"urn:enhancement-8187347a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> who shared his interest in the theory of <span id=\"urn:enhancement-f15b9907\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/complex_systems\">complex systems<\/span> and experience with that specific <span id=\"urn:enhancement-90c723a9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/operating_system\">operating system<\/span>. He recalls:&nbsp;<\/p>\n\n\n\n<p class=\"eplus-aXT7Tw\">&#8220;He was in charge of <span id=\"urn:enhancement-db0b1380\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">the <strong>security<\/span> on this <span id=\"urn:enhancement-a8ea1183\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/naval_ship\">naval vessel<\/span><\/strong> that carried all kinds of weapon systems. And he explained that the version and principles were was still present in the <span id=\"urn:enhancement-edcf330b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span> being used for launching rockets, despite the fact it was built in a time when there was no <span id=\"urn:enhancement-7992b46a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> in <span id=\"urn:enhancement-e6b81bb3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>. And then he said a really important thing. He said, \u2018Well, our <span id=\"urn:enhancement-d85b8b0c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> consists of a guy with a gun. Next to the chamber, we have our weapons because we do not connect to any <span id=\"urn:enhancement-a23e0720\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> in the world. I mean, our ship systems are not connected to the <span id=\"urn:enhancement-776db546\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet\">internet<\/span> and they do not have any connection to the outer world. So the guy with the gun at the door is enough for us, what we call physical <span id=\"urn:enhancement-2ae2afb2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>.\u2019&#8221;<\/p>\n\n\n\n<h2 class=\"eplus-bcUzig wp-block-heading\">The challenge of ship security<\/h2>\n\n\n\n<div class=\"wp-block-image eplus-cQzqa9\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"608\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-4.jpg\" alt=\"ship computer security\" class=\"wp-image-11332\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-4.jpg 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-4-300x178.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-4-768x456.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p class=\"eplus-guHAvX\">Boats are following the <span id=\"urn:enhancement-2ef701fb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/trend_estimation\">trends<\/span> of other transportation, equally being served by emerging <span id=\"urn:enhancement-a01c873\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/high_tech\">tech<\/span> such as <strong>IoT and automation<\/strong>, as well as new design principles and modes of energy. As Vincent notes in their use of <span id=\"urn:enhancement-e619af29\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet_of_things\">IoT<\/span>:<\/p>\n\n\n\n<p class=\"eplus-xS9OKP\">&#8220;Ships are equipped to send out <strong><span id=\"urn:enhancement-462f7ed1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/statistics\">statistics<\/span><\/strong> such as cargo weight and <strong>route planning<\/strong> to the supplier before it enters the port so that they already have the appropriate equipment ready to re-port them.&#8221;&nbsp;<\/p>\n\n\n\n<p class=\"eplus-Zc3flk\">Vincent noticed that when he purchased a radar system for his own vessel, it had a radar system that had <span id=\"urn:enhancement-32661bbe\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/wi-fi\">Wi-Fi<\/span> connected to it. This <strong>connectivity could not be disabled<\/strong>. The company started <span id=\"urn:enhancement-d601c390\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/research\">researching<\/span> such <span id=\"urn:enhancement-6e1df062\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span> and found many connections between ship systems that were never intended when they were designed, across marine, leisure and commercial vessels:&nbsp;<\/p>\n\n\n\n<p class=\"eplus-tlQnMi\">&#8220;These <span id=\"urn:enhancement-d799cd05\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span> have never been changed. They&#8217;re still there. And then we started looking at what kind of <span id=\"urn:enhancement-19a41467\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attack<\/span> vectors you have on naval <span id=\"urn:enhancement-f956b276\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span> actually to exploit this kind of behaviour on marine <span id=\"urn:enhancement-13a4dfae\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>. And it opened a box of Pandora of all very badly designed <span id=\"urn:enhancement-5b3caf80\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span> and very, all the ancient techniques that are still prevalent.&#8221;&nbsp;<\/p>\n\n\n\n<p class=\"eplus-nRQzvk\">There is even <strong><span id=\"urn:enhancement-609b282d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software\">software<\/span> without encryption or authentification<\/strong>. It&#8217;s not a matter of when <span id=\"urn:enhancement-17da997f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_security\">software security<\/span> was updated, but that it&#8217;s not present at all.&nbsp;<\/p>\n\n\n\n<p class=\"eplus-EmEI24\">Vincent notes that despite the <span id=\"urn:enhancement-7981fa76\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/innovation\">innovation<\/span> in architecture, design and materials that is <span id=\"urn:enhancement-92fdf994\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software_deployment\">deployed<\/span> into modern ships along with <strong>sensors<\/strong> and the <span id=\"urn:enhancement-7e161c0a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet\">internet<\/span> and other <strong><span id=\"urn:enhancement-667cbf33\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/embedded_system\">embedded systems<\/span><\/strong>, <span id=\"urn:enhancement-93f35151\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">the security<\/span> is ancient:<\/p>\n\n\n\n<p class=\"eplus-CtW0Sx\">&nbsp;&#8220;It&#8217;s still like a squeaking pirate ship. If you are on the beach, and you look at the water, and you see this big <span style=\"user-select: auto;\" id=\"urn:enhancement-d367dd16\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/containerization\">container<\/span> ship from China, you expect everything to be in order, and you expect everything to be failsafe. <\/p>\n\n\n\n<p class=\"eplus-ukkJUX\">But if you look at the <span style=\"user-select: auto;\" id=\"urn:enhancement-9b3f69f8\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/technology\">technology<\/span>, it&#8217;s still a <span style=\"user-select: auto;\" id=\"urn:enhancement-56434b5d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/technology\">technology<\/span> that&#8217;s being put together by duct tape and old and ancient techniques that have never been involved or updated. Because there was never the need to update it. Because there was never the intention to connect it to the outer world.&#8221;<\/p>\n\n\n\n<h2 class=\"eplus-WPoelZ wp-block-heading\">The problems are more complex than bad actors&nbsp;<\/h2>\n\n\n\n<p class=\"eplus-n92lZR\">I wondered about the motivation of <span id=\"urn:enhancement-7319e159\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attacks<\/span> like <strong>attacking a ship&#8217;s navigation systems<\/strong> of their ability to identify objects <span id=\"urn:enhancement-2970e20e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/underwater\">underwater<\/span>. Vincent asserts, however,&nbsp;<\/p>\n\n\n\n<p class=\"eplus-Dpt5Z9\">&#8220;We like to see the <span id=\"urn:enhancement-b50e22ee\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> of a <span id=\"urn:enhancement-309be26f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> as simply the idea of a bad actor threatening to cause disruption or damage. There are also elements of <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/lifecycle-remote-code-execution\/\">threats<\/a> such as failures, or outages, or incorrect <span id=\"urn:enhancement-5a5453ca\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span>, or the <span id=\"urn:enhancement-2e2cfa43\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> of staff being breached because you cannot trust your <span id=\"urn:enhancement-81fe5cab\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>.&#8221;<\/p>\n\n\n\n<p class=\"eplus-jWRrZF\">According to Vincent,  boats might not even be aware of stealth <span style=\"user-select: auto;\" id=\"urn:enhancement-e18ce2e5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attacks<\/span> on their <span style=\"user-select: auto;\" id=\"urn:enhancement-c4f04e4a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>. Even the use of <a style=\"user-select: auto;\" href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/gamedev\/big-data-game\/\">location intelligence<\/a> can be problematic if the <span style=\"user-select: auto;\" id=\"urn:enhancement-286ca760\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/automatic_identification_system\">AIS<\/span> (<span style=\"user-select: auto;\" id=\"urn:enhancement-866072c1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/automatic_identification_system\">Automatic identification system<\/span>) is hacked. &#8220;Everyone can see where a ship is, and you cannot protect the identity of a ship, because it has to send it out. <\/p>\n\n\n\n<p class=\"eplus-PwiOZr\">If this <span style=\"user-select: auto;\" id=\"urn:enhancement-408e66de\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> has been tampered with so it is now incorrect or invalid; you&#8217;ll have issues. Further, because of <strong style=\"user-select: auto;\"><span style=\"user-select: auto;\" id=\"urn:enhancement-6559724c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/privacy\">privacy<\/span> concerns<\/strong>, people tend to shut off their identification systems. This is not a case of <span style=\"user-select: auto;\" id=\"urn:enhancement-481635ee\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> by obscurity. <\/p>\n\n\n\n<p class=\"eplus-UUDDvp\">Rather,  it increases <span style=\"user-select: auto;\" id=\"urn:enhancement-c2495070\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> risks as maritime <span style=\"user-select: auto;\" id=\"urn:enhancement-86e9c7f0\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/organization\">organisations<\/span> are depending on this <span style=\"user-select: auto;\" id=\"urn:enhancement-68453189\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> for identification purposes to see a ship or to make ports safe. If you turn that off, you will have a problem.&#8221;<\/p>\n\n\n\n<div class=\"wp-block-image eplus-cV3u9N\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-2-1024x546.jpg\" alt=\"smartphone on ship\" class=\"wp-image-11333\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-2-1024x546.jpg 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-2-300x160.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-2-768x410.jpg 768w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p class=\"eplus-gcG3Oa\">According to Vincent, IT and bridge systems are often poorly configured or maintained. FortyTwo <span id=\"urn:enhancement-c7ee9989\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> has done penetration tests on PLC and industrial switches and due to inadequate <span id=\"urn:enhancement-8cec657a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> were able to completely take over <span id=\"urn:enhancement-3da64fa\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/command_computing\">command<\/span> of those ships completely and disable their <span id=\"urn:enhancement-48bfaaba\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/business_operations\">operation<\/span>, bringing the boat to a complete standpoint.&nbsp;<\/p>\n\n\n\n<h2 class=\"eplus-FSNrDQ wp-block-heading\">How easy is it to hack these ship systems?&nbsp;<\/h2>\n\n\n\n<p class=\"eplus-dK5fxs\">&#8220;Some <span id=\"urn:enhancement-5219d57e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attacks<\/span> are really complicated but generally its child&#8217;s play. So everyone with a few brain cells and a basic command system can hack these kinds of <span id=\"urn:enhancement-217f0272\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>. It&#8217;s not so sophisticated because <strong><span id=\"urn:enhancement-b8a44987\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> was not part of their <span id=\"urn:enhancement-6a5d13ed\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_architecture\">architecture<\/span><\/strong>.&#8221;&nbsp;<\/p>\n\n\n\n<h2 class=\"eplus-SudbLD wp-block-heading\">How is the maritime industry responding?&nbsp;<\/h2>\n\n\n\n<p class=\"eplus-inPwV1\">According to Vincent, that question is who is challenging the issue of maritime <span id=\"urn:enhancement-c76c1a2d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>. &#8220;<strong>None of the maritime organisations require ships to conform to a <span id=\"urn:enhancement-ea68145f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> <span id=\"urn:enhancement-1e9aa682\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/standardization\">standard<\/span><\/strong>. There is no <span id=\"urn:enhancement-43f91e77\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/requirement\">requirement<\/span> for <span id=\"urn:enhancement-5607311d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/penetration_test\">pen testing<\/span> the <span id=\"urn:enhancement-b044f82c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span> installed on a ship.&#8221;<\/p>\n\n\n\n<div class=\"wp-block-image eplus-4DjHrm\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1008\" height=\"617\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/marine.jpg\" alt=\"maritime organisations security\" class=\"wp-image-11334\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/marine.jpg 1008w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/marine-300x184.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/marine-768x470.jpg 768w\" sizes=\"auto, (max-width: 1008px) 100vw, 1008px\" \/><\/figure><\/div>\n\n\n\n<p class=\"eplus-gtplRx\">The International Maritime Authority has taken the <span id=\"urn:enhancement-2a249dfd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/initiative\">initiative<\/span> to raise awareness across the <span id=\"urn:enhancement-4df35ec6\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/industry\">industry<\/span> on how to tackle risks by promoting a <a href=\"http:\/\/www.imo.org\/en\/OurWork\/Security\/Guide_to_Maritime_Security\/Pages\/Cyber-security.aspx\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">maritime cyber risk management approach<\/a>. The overall goal is to support safe and secure shipping, which is operationally resilient to cyber risks, something which falls far short of a standard.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\" eplus-c4jDUu\">&#8220;FortyTwo security does audits against the payment card industry (PCI) standard, and we perform and do assessments and systems used in banking. In financial organisations, those organisations are our higher bound. They&#8217;re built around a risk perspective. <\/p>\n\n\n\n<p class=\" eplus-pEL1lp\">So they try to address risks that they know, but they also try to address risks that they do not know. They try to find risks that they are still unaware of. But that can materialise in their business because that disrupts their business model.\u00a0<\/p>\n\n\n\n<p class=\" eplus-gSCd0s\">In an aeroplane, everyone cares because they think well, this aeroplane can fall out of the sky, but in a ship, no one cares. The IMO says, well, it&#8217;s the manufacturer&#8217;s risk. And the manufacturer said yeah, but our systems are correct. <\/p>\n\n\n\n<p class=\" eplus-f6U1qG\">So it&#8217;s the ship&#8217;s owner&#8217;s problem. And the shipowner says yeah, but we integrate our systems, our system integrator should do it. Then the system integrator says, Oh, we just connect the cables. Try to find a maritime firewall, for example. Well, you might find one or two. But there are no firewalls or security systems for ships. It&#8217;s just non-existent.<\/p>\n\n\n\n<p class=\" eplus-slcRTJ\">Fortytwo security works for organizations in the maritime industry. &#8220;They act because they see it in their interest to know that it&#8217;s correct. But they cannot do anything because they don&#8217;t actually own ships. <\/p>\n\n\n\n<p class=\" eplus-X8xvDj\">We&#8217;ve talked to a few ship owners, and they see the issue, but they also know that there&#8217;s no real easy solution to go for except for retrofitting your ship with all kinds of different systems. Those that want to act are missing the actual tools and knowledge of what to do.&#8221;\u00a0<\/p>\n\n\n\n<p class=\"eplus-yS96Cp\"><em>Vincent will be sharing his company&#8217;s findings in a fun and interactive way at the <strong>Codemotion Online Tech Conference<\/strong> including a deep dive into the flaws of onboard systems, its attack vectors and a demonstration of their findings.<\/em><\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>When you think of ships and security, you&#8217;re probably thinking of boats attacked at sea by swarthy individuals waving machetes. But while this remains true, there&#8217;s also a more insidious way to attack ships &#8211; through their software. Modern vessels are equipped with all kinds of electronics, to ease navigation, assist in manoeuvring and assist&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/\">Read more<\/a><\/p>\n","protected":false},"author":85,"featured_media":11328,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":6,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4329],"tags":[],"collections":[],"class_list":{"0":"post-11093","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity","8":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hack a boat: IoT connected ships and security vulnerabilities - Codemotion<\/title>\n<meta name=\"description\" content=\"In preparation the upcoming Codemotion Online Tech Conference, we talk about ships, cybersecurity and IoT vulnerabilities with Vincent Ossewaarde.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"In preparation the upcoming Codemotion Online Tech Conference, we talk about ships, cybersecurity and IoT vulnerabilities with Vincent Ossewaarde.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-13T08:04:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-23T10:56:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cate Lawrence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cate Lawrence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/\"},\"author\":{\"name\":\"Cate Lawrence\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1\"},\"headline\":\"Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities\",\"datePublished\":\"2020-10-13T08:04:16+00:00\",\"dateModified\":\"2021-12-23T10:56:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/\"},\"wordCount\":1571,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/\",\"name\":\"Hack a boat: IoT connected ships and security vulnerabilities - Codemotion\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg\",\"datePublished\":\"2020-10-13T08:04:16+00:00\",\"dateModified\":\"2021-12-23T10:56:39+00:00\",\"description\":\"In preparation the upcoming Codemotion Online Tech Conference, we talk about ships, cybersecurity and IoT vulnerabilities with Vincent Ossewaarde.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1\",\"name\":\"Cate Lawrence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"caption\":\"Cate Lawrence\"},\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hack a boat: IoT connected ships and security vulnerabilities - Codemotion","description":"In preparation the upcoming Codemotion Online Tech Conference, we talk about ships, cybersecurity and IoT vulnerabilities with Vincent Ossewaarde.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/","og_locale":"en_US","og_type":"article","og_title":"Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities","og_description":"In preparation the upcoming Codemotion Online Tech Conference, we talk about ships, cybersecurity and IoT vulnerabilities with Vincent Ossewaarde.","og_url":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2020-10-13T08:04:16+00:00","article_modified_time":"2021-12-23T10:56:39+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg","type":"image\/jpeg"}],"author":"Cate Lawrence","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Cate Lawrence","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/"},"author":{"name":"Cate Lawrence","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1"},"headline":"Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities","datePublished":"2020-10-13T08:04:16+00:00","dateModified":"2021-12-23T10:56:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/"},"wordCount":1571,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/","url":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/","name":"Hack a boat: IoT connected ships and security vulnerabilities - Codemotion","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg","datePublished":"2020-10-13T08:04:16+00:00","dateModified":"2021-12-23T10:56:39+00:00","description":"In preparation the upcoming Codemotion Online Tech Conference, we talk about ships, cybersecurity and IoT vulnerabilities with Vincent Ossewaarde.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/connected-ships-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1","name":"Cate Lawrence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","caption":"Cate Lawrence"},"url":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-600x600.jpg","author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg",1200,675,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-300x169.jpg",300,169,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-768x432.jpg",768,432,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg",1200,675,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg",1200,675,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3.jpg",100,56,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/10\/Senza-titolo-1-3-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_comment_info":0,"uagb_excerpt":"When you think of ships and security, you&#8217;re probably thinking of boats attacked at sea by swarthy individuals waving machetes. But while this remains true, there&#8217;s also a more insidious way to attack ships &#8211; through their software. Modern vessels are equipped with all kinds of electronics, to ease navigation, assist in manoeuvring and assist&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/11093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=11093"}],"version-history":[{"count":8,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/11093\/revisions"}],"predecessor-version":[{"id":11730,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/11093\/revisions\/11730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/11328"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=11093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=11093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=11093"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=11093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}