{"id":320,"date":"2023-04-16T22:40:28","date_gmt":"2023-04-16T22:40:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/?p=320"},"modified":"2023-04-16T22:40:28","modified_gmt":"2023-04-16T22:40:28","slug":"case-study-of-port-antwerp-physical-and-online-threats","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/2023\/04\/16\/case-study-of-port-antwerp-physical-and-online-threats\/","title":{"rendered":"Case Study of Port Antwerp Physical                            and Online Threats"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Case Study of Port Antwerp<br>Physical and Online Threats<br>Josiah Morgan<br>Introduction:<br>The progress of the advancement of technology increases each and every day. The advancement<br>of technology came a long way from the first industrial revolution. Original machines required<br>more human labor than technical labor. An example of a machine from the first revolution is the<br>Spinning Jenny. A machine in which using arm labor processed cotton. Nowadays we have no<br>use for such machines, because we are far much more advanced than we were in the 1700\u2019s. In<br>today\u2019s age not much human labor is required when it comes to technology. The advancements to<br>technology have been extremely beneficial to day to day life. Along with good things come bad.<br>With those advancements more and more cyber security threats have been created. A prime<br>example of cyber crime is the case study of Port Antwerp. Port Antwerp would transport<br>hundreds of millions of containers. Through these transports criminals would transport drugs and<br>illegal contraband. Eventually in 2011 with the advancement of technology criminals became<br>more advanced and used a more advanced way to commit their crimes. With the use of phishing<br>attacks criminals took over the port and had full control on when and where all shipments went.<br>Eventually in 2013 technology became more advanced, so did the hackers. Hackers used<br>keyloggers and pwnies and took over the passwords and pins of the entire system. Port Antwerp is a prime example of how with the advancement of technology will bring more and more<br>advanced cyber threats. This article will give you a brief history of technology and answer the<br>questions of how to mitigate factors to a technical challenge\/threat, what pwine is and how to<br>mitigate it, how to protect a business from inadequate cyber security, what are techniques used<br>by companies to mitigate these risks, and whether of not physical security important in the world<br>of cyber security.<\/p>\n\n\n\n<p><br>History<br>Technology was first revolutionized in 1760 with machines such as the spinning jenny, water<br>wheel, power loom, and spinning mule. During this time everything was done by hand, and<br>cyber security threats weren\u2019t a thing, just physical threats. The second revolution came with the<br>creation of electricity and power machines. At this time technology was less reliant on man and<br>more self reliant. Cyber security threats still weren&#8217;t a thing at this time. The next industrial<br>revolution introduced computers. Along with computers cyber security threats were introduced at<br>this time. The fourth and last industrial revolution was the introduction of Cyber-Physical<br>Systems or the Internet. This revolution is part of today&#8217;s age, many cyber security threats are a<br>part of today&#8217;s age.<\/p>\n\n\n\n<p><br>Port of Antwerp<\/p>\n\n\n\n<p>The Port of Antwerp is a part of the shipping industry. Antwerp is the 15th largest shipping<br>industry port in the world. The port is used to ship and transport goods and materials through<br>large indestructible metal boxes. Ports like Antwerp are legitimate businesses, but that doesn\u2019t<br>stop criminals from conducting illegal business within. Drug cartels and rings would sneak<br>illegal contraband and drugs into these boxes and transport them across countries. With the<br>advancement of technology Antwerp improved its security so simple criminals can\u2019t just sneak<br>illegal drugs and contraband into containers. The criminals found a way around this in 2011.<br>Using phishing attacks criminals took over access to when, where, and what the port was<br>shipping. This is a show of how the advancement of technology will also bring new threats. In<br>2013 criminals wanted something much bigger than just a simple phishing attack. Full control of<br>the port is what the criminals aimed for. In the process of physically breaking into the port with<br>the help of keyloggers (A device that marks every move\/keystroke on a device) and pwnies<br>(device disguised as powerstrip\/router used to hack\/own someone&#8217;s device). Eventually workers<br>at the Port of Antwerp found out about the missing containers and the criminals inevitably were<br>prosecuted. Again the Port of Antwerp\u2019s cyber security risks were mitigated, and security<br>systems were improved.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Questions for Mitigation<br>Factors<br>When it comes to prevention of what happened at the Port of Antwerp there are plenty of factors<br>that could have been mitigated to prevent what happened. The number one factor is physical<br>security. In the beginning even before the cyber attacks criminals were physically sneaking in<br>drugs into the port, so it&#8217;s needless to say that this has been a problem that could have been<br>solved already. I think the attack in 2013 could have been prevented if the port had better<br>physical security, because the hackers had to break in to place the keyloggers and pwnies.<br>Surveillance is another factor that can be improved. Security cameras that have 24\/7 view on all<br>the containers would prevent any of the events that occurred in 2011-2013.<\/p>\n\n\n\n<p><br>Pwnies<br>Pwnies are hacking devices that disguised themselves as something such as a router or power<br>surge. These devices give hackers access to own your network. Mitigating something like this is<br>tricky. Having a clear distinction or label on all your devices is one way to prevent these. ALong<br>with that good surveillance will suffice, so you know if one of your routers of surges has been<br>switched out for one of these devices, and you can dispose of it right away.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Supply Chain<br>The events of 2013 at the Port of Antwerp were caused by a lack of security of smaller<br>companies in Antwerp\u2019s supply chain. There are ways this could have been prevented. In a<br>supply chain to mitigate risk to the main company, other companies&#8217; systems should not be<br>connected to the head\u2019s mainframe network. Smaller companies should have their own network<br>that they are responsible for that way if there is an attack on them the main network is not<br>compromised. Also there should be a general base of security requirements for any company in<br>the supply chain. That way everything through all the networks is secure.<\/p>\n\n\n\n<p><br>Physical security<br>As mentioned before, the events of 2013 at the Antwerp Port could have been prevented if there was<br>better physical security. Any cyber security expert should know physical security comes first. If a hacker<br>can do substantial damage to your system from thousands of miles away, what do you think they can do<br>when they have direct access to your whole network? Protecting your network physically is just as if not<br>more important than protecting it in the cyber world. Not only hackers, but normal criminals can damage<br>your system physically. If you have no physical security what&#8217;s stopping a criminal from using normal<br>tools to break your system and maybe access money vaults or other valuable assets.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Conclusion<br>After reading this article you will learn some brief history of technology, and also the story behind the<br>Port of Antwerp. Along with those learnings you will have learned mitigation strategies and how all the<br>events of Antwerp could have been prevented with better technology, and physical security. The cyber<br>world is evolving everyday along with that evolution of technology comes more threats. No one can truly<br>be fully prepared for every threat. It\u2019s important to improve security online and physically to mitigate and<br>prevent any unknown threats<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Case Study of Port AntwerpPhysical and Online ThreatsJosiah MorganIntroduction:The progress of the advancement of technology increases each and every day. The advancementof technology came a long way from the first industrial revolution. Original machines requiredmore human labor than technical labor. An example of a machine from the first revolution is theSpinning Jenny. A machine in&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/2023\/04\/16\/case-study-of-port-antwerp-physical-and-online-threats\/\">Read More<\/a><\/div>\n","protected":false},"author":26175,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/users\/26175"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"predecessor-version":[{"id":321,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/320\/revisions\/321"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}