Cyber-attacks: a digital threat reality affecting the maritime industry Cyber-attacks have become a digital threat reality affecting the maritime industry. The industry, which includes companies, ports, administrations, and ships, is exposed to a variety of cyber threats, including those that target the technology systems that are vital to the industry’s operations. This article will analyze […]
In-transit threats and risk management in Maritime industry. Maritime transportation is a vital component of global trade, with an estimated 80% of international trade by volume and 70% by value being transported by sea. However, this reliance on maritime transportation also brings a range of security challenges, including the potential for in-transit threats. These threats […]
Firewalls Introduction Since the late 1980s, the word firewall has seen restricted use to portray a device that obstructs unwanted network traffic while enabling other traffic to pass. The 1st published definition of “contemporary” firewall encompassing the use of that term was in an article named ‘Practical Unix Security’ whose publication was in the year […]
Social media usage and cyber-crime Introduction With the increased level of exposure that people have on the current social media channels, it is very easy for a particular person to easily share his or her information. For example, the introduction of media channels that are more into gaining access to the users’ data such as […]
How to employees justify cyberloafing? Cyberloafing refers to the act of using the internet for non-work related activities during work hours. Despite the potential negative consequences for both the employee and the employer, it is a common occurrence in the modern workplace. In this essay, we will explore the various ways in which employees justify […]
The use of Blockchain technology in cybersecurity Blockchain technology is a decentralized system that uses cryptography to secure transactions and ensure data integrity. It was first introduced as the underlying technology for the cryptocurrency, Bitcoin, but has since been adapted for a wide range of applications, including cybersecurity. The use of blockchain technology in cybersecurity […]