Cybersecurity

Improved Essays
The reliance of the national and world economies on the global supply chain make them vulnerable to any number of incidents, including deliberate attack, natural disasters and accidents. Furthermore, the supply chain’s existence on both land and sea require several different modes of transportation to function properly. Each of these different modes of transportation present unique security challenges, which must be addressed in order to ensure the efficient flow of goods across the globe. Of the different modes of transportation associated with the global supply chain, the maritime security element, specifically, container shipping and its associated operations (i.e. port operations), are the most vulnerable. This is primarily due …show more content…
Although cyber awareness has steadily increased over the years, Kramek (2013) points out that “cybersecurity awareness in U.S. port facilities [is] generally low [and] the cybersecurity culture in U.S. port facilities is generally lacking” (p. 27). This is a frightening revelation considering our reliance on technology today. Poor cybersecurity practices could lead to a number consequences, including lost cargo, delays, disruption, physical or environmental damage. Equally significant is the effect on our economy if ports around the U.S. were to suffer catastrophic cyber-attacks. In 2014, U.S. seaports contributed $4.56 trillion to the economy of which “$4.3 trillion was the economic value created by the movement of cargo through seaports” (DHS, 2016, p. 3). The second, and perhaps less obvious, vulnerability associated with seaports is the coming together of different modes of transportation. Seaports are reliant on truck and rail carriers to move containers from the port to their final destination. Although the container remains the same, the size, shape and composition of the vehicles carrying the containers makes container shipping security that much more difficult. Additionally, these different modes of transportation represent a near limitless number of avenues through which contraband can be moved from one country to virtually any point with

Related Documents

  • Improved Essays

    In his case he shares his that there is no central front and that it is quite difficult for America to be able to project its power on multiple fronts. I agree with Mr. Flynn’s argument that we spend or have spent more money to fight a war in Iraq that I feel we had no business being there than we spent to protect our own seaports. The United States offers our enemies a vast menu of soft targets: water and food supplies; chemical plants; bridges, tunnels, and most important ports. Stephen Flynn suggests that several measures that were developed to protect the vital system named above are hardly fit to deter amateur thieves, smugglers, and let alone determined terrorists (Flynn,…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    If we want to defense our coast line, we do not have to leave crews members in the sea for months, even years. However, the environmental impact could occur because ships engines emit heat, noise, particulates and gases which contribute to climate change and global warming. Ships will become more efficient and less polluting over time. On the other hand, these small gains have and will continue to be overwhelmed by the gross inefficiency of the activity and the rapid growth of the…

    • 395 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hurricane Response Paper

    • 534 Words
    • 3 Pages

    Being in the Coast Guard at a Maritime Safety and Security Teams (MSST) we provide rapidly deployable specialized waterborne and shore side antiterrorism forces for critical maritime infrastructure and strategic maritime shipping throughout the ports of the United States and ports of interest abroad. The current utilization of MSSTs represents an unbalanced equation of risk versus mission accomplishment. We are reserved to function as a contingency response asset for significant national or regional maritime. We routinely conduct full-scale training and exercises on a host of terrorist response scenarios, which allows us to react with a degree of familiarity in the event of terrorist…

    • 534 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    While on the other hand, the responsibility for securing the homeland against maritime threats brings significant challenges across different entities’ efforts (2014). The two organizations that contributed the most in maritime security are the Department of Defense (U.S. Navy) and the Department of Homeland Security (U. S. Coast Guard) (2014). Challenges they faced escalates due to the numerous unguarded coastlines around the United States. In 2005, the National Strategy for Maritime Security confronted the challenges by providing a Maritime Operational Threat Response Plan (MOTR) on how to respond to maritime threats (2014). Maritime security calls for a synchronized inter-agency response to real-time emergent threats in which the MOTR has proven to be effective…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    This narrow channel of water between Sumatra and Malaysia creates the link between the Indian Ocean and the Pacific Ocean, making the Malacca Strait one of the most frequently traversed passages taken by commercial vessels and tankers (Burgess 160). As of 1998, four of the world’s five busiest seaports, which include Rotterdam, Singapore, Shanghai, Nagoya, and Hong Kong, exist in Asia (Marley 26). As Chalk states, piracy is driven by the large amount of trade moving through the sea on vessels and tankers, as well as the need for these ships to pass through dangerous waters which are not secured and are filled with lurking pirates (2). With the few numbers of bodies of water that commercial ships can travel through to arrive at their intended destination,…

    • 1747 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    It is considered the gateway to the world for both shipping and travel needs, with three major railroads that receive goods from other countries, as well as commercial freight and transportation of military goods to include ammunition. Terrorist attacks such as planting a bomb to detonate within the downtown area, or gaining access to the military goods being transported can make for a nightmare on the railways. The downtown portion of Metropolis is a prime spot for terror activity with the shopping malls, outlet stores, restaurants, movie complexes, bowling alleys…

    • 1447 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Terrorist attacks across the world are increasing with no predictions of letting up. After the terrorist attack on September 11 2001, the United States committed itself to ensure that such an attack as 9/11 would never surprise the country again. Dedicated to this promise, the United States Congress immediately passed legislation and created the Department of Homeland Security. The main objective of the Department of Homeland Security is to secure the nation from many threats and hazards; and, to ensure that the homeland is safe, secure, and resilient against terrorism. Additionally, in order to further strengthen the United States security posture at seaports, the United States requires each seaport to maintain various levels of security…

    • 1450 Words
    • 6 Pages
    Great Essays
  • Great Essays

    This paper has five chapters along with appendices and bibliography. The chapters outline as follows: Chapter 1 Introduction - the first chapter explains background of the port and core activities. Moreover the problem statement and the structure of this paper are briefly explained. <ore detailed information will be given later on in the paper. Chapter 2 Literature Review - this chapter explains the literature that will be used to describe the operational challenge for the trans-shipment containers.…

    • 1356 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Cyber Security: The Concept Protecting ICT systems alongside their content is popularly known as cyber security. Without a doubt, the concept is both broad and fuzzy. Although useful, the term lacks a precise definition since it refers to either one or three of the following components, as elucidated by Fischer (2015): 1. A collection of activities and measures aimed at protection from attacks, disruptions, or threats to computers and their networks, related hardware and software, as well as information contained or communicated, such as software and data, in addition to aspects of cyberspace; 2. The quality or state of protection from the multiplicity of the above or related threats; and 3.…

    • 1213 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    This is why cyber intelligence is so important to the Coast Guard and the government alike. Moreover, reliance on cyber systems within the Coast Guard…

    • 1202 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    The maritime industry since the beginning of recorded time has been the focal point for transportation of goods around the world. It is the most economical and environmentally friendly way to transport large goods throughout the world. Today, around 90% of world trade is carried by the maritime industry. Around 50,000 merchant ships, registered in over 150 nations and manned by over a million seafarers of nearly every nationality, transport every kind of cargo internationally.…

    • 2141 Words
    • 9 Pages
    Improved Essays