MARITIME CYBER SECURITY Archives - Page 27 of 41 - SHIP IP LTD

The Maritime and Port Authority of Singapore (MPA) was established on 2 February 1996, with the mission to develop Singapore as a premier global hub port and international maritime centre (IMC), and to advance and safeguard Singapore’s strategic maritime interests.

MPA is the driving force behind Singapore’s port and maritime development, taking on the roles of Port Authority, Port Regulator, Port Planner, IMC Champion, and National Maritime Representative.

MPA partners the industry and other agencies to enhance safety, security and environmental protection in our port waters, facilitate port operations and growth, expand the cluster of maritime ancillary services, and promote maritime R&D and manpower development.

 

As the head leading MPA’s efforts in driving cyber and data security in the maritime industry, you will play a crucial role in formulating and implementing national cybersecurity initiatives and planning operational responses to cyber threats and incidents for the Maritime sector.

You will formulate policies pertaining to the protection of the Maritime Critical Information Infrastructure (CII) and other important Maritime systems. This includes developing, governing and enforcing CII cyber and data security policies, standards and guidelines, including rolling out training, education and outreach programmes for MPA and the industry. To do this, you are required to keep abreast of the latest Government and industry cyber and data security practices and technologies as well as emerging threats and vulnerabilities for ICT and Operations Technology (OT) systems.

You will also formulate internal policies and processes to implement Government’s requirements for cyber and data security requirements and put in place governance processes and controls for the IT and Port Systems clusters to ensure that MPA meets the compliance requirements. Periodic compliance audits are also required to be carried out in accordance to national policies. To achieve this, you are also expected to govern the cyber and data security‘s software testing for MPA systems and implement the security operations and requirements at the IT infrastructure layer.

To enhance early detection capability, you will lead the Information Exchange Framework developed for the Port Authorities CIO Cybersecurity Network (PACC-Net) and improvise the Maritime Cyber Security Network (MCSN) Portal to ensure effective and safe communication, as well as informtion sharing among the maritime stakeholders. You will also be required to manage the operation of 24×7 Maritime Cybersecurity Operation Centre, including conceptualising and deploying new concepts of operation leveraging on advanced technologies and trained analysts for early Threat Detection, Monitoring, Response, Intelligence, and Information Sharing and Analysis for the Maritime sector.

You will establish the cyber incident response framework to ensure readiness to respond to cyber-security incidents. You will manage and conduct investigations to ensure appropriate follow up actions are taken to address any security gaps. You will also plan, conduct and participate in exercises to ensure preparedness at national and agency level to deal with any cyber security incidents.

You are expected to profile MPA’s cybersecurity capabilities and initiatives to gain mindshare within the government and industry.

Requirements

  • Relevant experience in professional accreditations such as CISM, CISSP, CGEIT and CISA; and
  • At least 8 years of experience in ICT /Operational Technology (OT) related role in the areas of cyber security governance, risk management, cyber security defence, cyber incident management and investigation in a complex IT/OT environment.
  • Prior experience with ICT Governance and ICT infrastructure architecture concepts and technical background on network and firewall deployment, and security for cloud architecture, will be preferred.
  • Source: careers

The global shipping industry sustained a second cyber attack within a week that’s raising concern about disruptions to supply chains already straining to move goods heading into the usual peak season for consumer demand.The International Maritime Organization, a United Nations agency that serves as the industry’s regulatory body, said in a statement Thursday it has suffered “a sophisticated cyber attack against the organization’s IT systems.” A number of IMO web-based services are currently unavailable and the breach is affecting its public website and internal systems, it said.

That attack followed the disclosure earlier this week by closely held CMA CGM SA, the world’s fourth-biggest container liner by capacity, that its information systems were compromised. The Marseille, France-based company said Thursday that offices are “gradually being reconnected to the network thus improving the bookings’ and documentation’s processing times.”

“We suspect a data breach and are doing everything possible to assess its potential volume and nature,” the company said in an emailed statement. CMA CGM is among the world’s five leading container liners that account for 65% of global capacity, according to Alphaliner data.

A ‘Headache’

A rash of cyber incidents has afflicted the shipping industry in recent years, the biggest of which was an intrusion that cost Copenhagen-based A.P. Moller-Maersk A/S about $300 million in 2017.

The Maersk incident “has clearly drawn the attention of scammers and cyber criminals who realized that the shipping industry is acutely exposed,” said Ken Munro, a security specialist at Pen Test Partners, a cyber-security company with clients in the maritime industry. “If shore-based systems aren’t available to book containers, ships can’t load and can’t generate revenue. Targeted attacks against shipping lines are therefore lucrative for ransomware operators.”

While it’s too soon to say whether the recent attacks will prove to be a brief irritant for global trade or a trigger of wider damage, logistics experts like Bloomberg Intelligence’s Lee Klaskow say the cyber threats are a “near-term headwind and headache for sure.”

The timing of the latest acts of cyber piracy is particularly bad for shipping liners that are still waiting to see some normalcy restored to their seasonal cycles.

The pandemic threw supply chains out of sync for everything from paper towels and face masks to trampolines and computer monitors, as consumers were forced to work from home and purchase necessities online.

The demand on shippers, which reduced capacity initially in anticipation of deep recessions caused by Covid-19 lockdowns, hasn’t really abated because e-commerce purchases have stayed strong and companies are restocking inventories.

As a result, the benchmark cost to move cargo containers across the Pacific has tripled since the start of the year.

Source: aljazeera


CMA CGM has become the latest shipping company to be hit with a cyber attack it confirmed on Monday.

The world’s third largest container line said on Monday that it was dealing with a cyber attack impacting peripheral servers, excluding its logistics arm, CEVA Logistics.

“As soon as the security breach was detected, external access to applications was interrupted to prevent the malware from spreading,” CMA CGM said.

“Our teams are fully mobilized and access to our information systems is gradually resuming. The CMA CGM network remains available to the Group’s customers for all booking and operation requests.”

According to social media posts the cyber attack is in the form of ransomware, although the exact nature of the attack remains unknown.

“An investigation is underway, conducted by our internal experts and by independent experts,” the company said.

Earlier this year fellow container line MSC was hit by a malware attack, which took down all its customer facing systems, while logistics company Toll Group has been subject to two cyber attacks this year. IN 2017 Maersk Line was hit globally by the NotPetya malware attack.


MAKKAH: Saudi Arabia has warned the UN Security Council that an “oil spot” has been sighted in a shipping lane 50 km west of an abandoned, decaying oil tanker off the coast of Yemen. Experts fear it could spill 1.1 million barrels of crude into the Red Sea.

The tanker, called the Safer, has been moored near Ras Issa oil terminal for more than five years. The UN previously warned that it could leak four times as much oil as was spilled during the 1989 Exxon Valdez disaster off the coast of Alaska. UN Secretary-General Antonio Guterres and the Security Council have repeatedly called on Houthi insurgents in Yemen to grant access the tanker for a technical assessment and emergency repairs.

In a letter to the 15-member Security Council on Wednesday, Saudi Ambassador to the UN Abdallah Al-Mouallimi said “a pipeline attached to the vessel is suspected to have been separated from the stabilizers holding it to the bottom and is now floating on the surface of the sea.”

He said the vessel “has reached a critical state of degradation, and the situation is a serious threat to all Red Sea countries, particularly Yemen and Saudi Arabia,” adding “this dangerous situation must not be left unaddressed.”

Ahmed Al-Ansari, an environmental expert in Jeddah, said: “There is no doubt that the Houthi militias’ intransigence in allowing … maintenance of the tanker … has increased the chances of deterioration.”

It might result in a major oil leak, he added, that could cause an unprecedented environmental disaster, the “negative economic, environmental and health effects (of which) will be great on the countries of the region and the world, due to the importance of the Red Sea in international maritime transport” as a major link between East and West.

Al-Ansari welcomed the efforts of Saudi authorities to press for action in the UN “to ensure that the Kingdom’s shores and regional waters are protected from all potential dangers.”

Independent researchers are also concerned about the condition of the Safer. In a 2019 report for the Atlantic Council titled “Why the massive floating bomb in the Red Sea needs urgent attention,” energy experts Ian Ralby, David Soud and Rohini Ralby said the potential consequences of a disaster include an end to the two-year cease-fire in Hodeidah and a worsening of Yemen’s humanitarian crisis.

“The risk of explosion increases by the day and if that were to happen, not only would it damage or sink any ships in the vicinity, but it would create an environmental crisis roughly four and a half times the size of the Exxon Valdez oil spill,” they said.

Other experts warn that the security situation in Yemen adds to the danger. “(Given) the complexity of this war, an errant bullet or shell from any one of the combatants could trigger a blast as large as Beirut’s Aug. 4 disaster, prompting a historic oil spill,” Dave Harden, managing director of Georgetown Strategy Group, wrote in an op-ed published by news website The Hill last month. “Cleanup efforts would be daunting — given the insecurity of being in a war zone and the additional health risks from COVID-19.”

Waleed Al-Qudaimi, deputy governor of Hodeidah, said an oil spill would create a humanitarian crisis as severe as the one caused by the Houthi insurgency.

“It (would) add an additional burden that will affect Yemen for decades, deprive thousands of people of their jobs and destroy marine biodiversity in Yemeni waters,” he said as he appealed for the international community to maintain pressure on the Houthis to allow maintenance work.

Copyright: Arab News © 2020 All rights reserved. Provided by SyndiGate Media Inc.


[The excerpts below are from the book Maritime Cybersecurity: A Guide for Leaders and Managers, published in early September.]

[T]hreats must be put into context. The figure [below] shows the light configuration of a vessel that you do not want to see steaming towards you at night. Not only is this ship coming towards you head-on, it suggests that you are already in very dangerous waters, per Rule 27(f) in the Navigation Rules.

While this portrayal has a certain element of dark humor to it, it is also analogous to real life. When a ship is in a minefield, what is the real problem? Is it the threat of hitting a mine, or is it the vulnerability of the ship to the damage caused by the explosion? During the early days of the Battle in the Atlantic during World War II, Germany deployed magnetic mines against the British. The mines rose from the seafloor when they detected the small change in the Earth’s magnetic field that occurred when a steel-hulled vessel came within range. The British, upon discovering this mechanism, took countermeasures to effectively degauss their warships. This change eliminated the mine’s ability to exploit the ship’s magnetic field and, at least temporarily, obviated the threat. The vulnerability of the ship to a mine was not eliminated, but the exploit was defeated.

In cyberspace, we can’t control where the mines are, but we can control our susceptibility to getting hit by one and the subsequent damage that could result.

This leads to the following general truth about cybersecurity:

Vulnerabilities Trump Threats Maxim: If you know the vulnerabilities (weaknesses), you’ve got a shot at understanding the threats (the probability that the weaknesses will be exploited and by whom). Plus, you might even be OK if you get the threats all wrong. But if you focus mostly on the threats, you’re probably in trouble.

Threats are a danger from someone else that can cause harm or damage. We might or might not be able to identify a potential threat, but we cannot control them. Vulnerabilities are our own flaws or weaknesses that can be exploited by a threat actor. Indeed, not all vulnerabilities can be exploited. We are—or should be—able to identify our vulnerabilities and correct them.

While we cannot control the threats, we should be knowledgeable about the threat landscape and have an idea of threat actors who might wish to do us harm, but we should not obsess over the threats while planning a cyberdefense. Instead, we should look inward at our own systems, seek out the vulnerabilities, and plug the holes. New threats always emerge, but that doesn’t change the strategic importance of fixing our own vulnerabilities.

Ironically, there is a corollary to this maxim: “Identifying threats can help get you funding while identifying vulnerabilities probably won’t.” Almost all cybersecurity professionals have gone to management to seek funds for an emergency update to hardware or software, just to be told that fixing a vulnerable system can always wait until the next budget cycle. Conversely, when management sees a memo from IMO or USCG, or a warning from an ISAC/ISAO, that highlights a credible threat directed at that same hardware or software, it’s remarkable how quickly the funds become available.

——————————————————–

A common but mistaken belief at the leadership level of many organizations, both within the maritime industry and beyond, is that the responsibility for protecting information assets lies within the technology ranks. To those who subscribe to that belief, let us share the following: Anyone who thinks that technology can solve their problems does not understand technology or their problems.

Cybersecurity—or, arguably more properly, information security—is not merely, or even primarily, the responsibility of the IT department. Everyone who comes in contact with information in any form has the responsibility to protect it and, further, to recognize when it is under attack—and take whatever action is required to defend it, including reporting suspected attacks to the appropriate defensive agencies within the organization. Ultimately, it is the responsibility of a designated Chief Information Security Officer (CISO) to manage the cybersecurity posture of an organization. That posture includes the creation of a sense of urgency and awareness around cyberthreats at every level of the organization.

It is also important to recognize that IT and cybersecurity professionals have different—albeit often overlapping—skill sets. IT professionals keep networks running and resilient, and provide services and application to the users; cybersecurity professionals defend these assets.

——————————————————–

[We wrote this book for] the maritime manager, executive, or thought leader who understands their business and the maritime transportation system, but is not as familiar with issues and challenges related to cybersecurity. Our goal is to help prepare management to be thought and action leaders related to cybersecurity in the maritime domain. We assume that the reader knows their profession well, knowledge that will help to provide the insight into how cyber affects their profession and organization.

Chapter One (The Maritime Transportation System, MTS) provides a broad, high-level overview of the MTS, the various elements within it that we’re trying to secure, and the size and scope of the challenge. Chapter Two (Cybersecurity Basics) offers terms, concepts, and the vocabulary required to understand the articles that one reads and the meetings that one attends that discuss cybersecurity.

The next three chapters describe actual cyber incidents in various domains of the MTS and their impact on maritime operations. Chapters Three through Five address cyberattacks on shipping lines and other maritime companies, ports, and shipboard networks, respectively. Chapter Six (Navigation Systems) discusses issues relating to Global Navigation Satellite Systems (GNSS) and Automatic Identification System (AIS) spoofing and jamming, while Chapter Seven (Industrial Control and Autonomous Systems) presents cyber-related issues and the ever-increasing challenge of remote control, semi-autonomous, and fully-autonomous systems finding their way into the MTS.

Chapter Eight (Strategies for Maritime Cyberdefense) discusses practices that address cybersecurity operations in the MTS, including risk mitigation, training, the very real need for a framework of policies and procedures, and the development and implementation of a robust cybersecurity strategy. Chapter Nine offers final conclusions and a summary.

——————————————————–

Author’s note: This book is intended to speak to all levels of members of the MTS, from executives, directors, and ship masters to managers, crew members, and administrative staff. Our hope is that it informs the reader to a higher level of awareness so that they can be more aware of the threats and be better prepared — at whatever level of their job — to protect their information assets.

Because the field is so fast moving, we also have a Web site — www.MaritimeCybersecurityBook.com — where we will post additional information.

Gary C. Kessler is a Professor of Cybersecurity in the Department of Security Studies & International Affairs at Embry-Riddle Aeronautical University. He is also the president of Gary Kessler Associates, a training, research, and consulting company in Ormond Beach, Florida.

Steven D. Shepard is the founder of Shepard Communications Group in Williston, Vermont, co-founder of the Executive Crash Course Company, and founder of Shepard Images. 


With today’s news that French shipping giant CMA CGM has been hit by a ransomware attack, this now means that all of the four biggest maritime shipping companies in the world have been hit by cyber-attacks in the past four years, since 2017.

Previous incidents included:

  1. APM-Maersk – taken down for weeks by the NotPetya ransomware/wiper in 2017.
  2. Mediterranean Shipping Company – hit in April 2020 by an unnamed malware strain that brought down its data center for days.
  3. COSCO – brought down for weeks by ransomware in July 2018.

On top of these, we also have CMA CGM, which today took down its worldwide shipping container booking system after its Chinese branches in Shanghai, Shenzhen, and Guangzhou were hit by the Ragnar Locker ransomware.

This marks for a unique case study, as there is no other industry sector where the Big Four have suffered major cyber-attacks one after the other like this.

But while all these incidents are different, they show a preferential targeting of the maritime shipping industry.

“I’m not so sure it’s that they’re any more or less vulnerable than other industries,” said Ken Munro, a security researcher at Pen Test Partners, a UK cyber-security company that conducts penetration testing for the maritime sector.

“It’s that they are brutally exposed to the impact of ransomware.

“After Maersk was hit by the NotPetya crytper, I believe criminals realized the opportunity to bring a critical industry down, so payment of a ransom was perhaps more likely than other industries,” Munro said.

IT’S NOT THE SHIPS! IT’S THE SHORE-BASED NETWORKS

Over the past year, incidents where malware landed on ships have intensified. This included sightings of ransomware, USB malware, and worms; all spotted aboard a ship’s IT systems.

Maritime industry groups have responded to these increasing reports of malware aboard ships by publishing two sets of IT security guidelines to address maritime security aboard ocean-bound vessels.

But Munro points out that it’s not the ships that are usually getting attacked in the major incidents.

Sure, malware may land on a ship’s internal IT network once in a while, but the incidents where malware gangs have done the most damage were the attacks that targeted shore-based systems that sit in offices, business offices, and data centers.

These are the systems that manage personnel, receive emails, manage ships, and are used to book container transports. There is nothing particularly different from these systems compared to any other IT systems sitting inside other industry verticals.

“That said, if you can’t book a container, there’s no point in having the ship,” Munro added.

For all intents and purposes, it appears that despite efforts to protect ships from external hacking, the maritime industry has failed to treat its shore-based systems with the same level of attention.

While the rare ship hacking incidents are the ones that usually grab headlines, it’s the attacks on a shipping company’s shore-based systems that are more common these days, and especially the attacks on their container booking applications.

These systems have often been hacked by sea pirate groups looking for ship manifests, container ID numbers, and ship sea routes so they can organize attacks, board ships, and steal containers transporting high-value goods like electronics and jewelry [1234].

These waves of “cyber pirates,” as these groups have been often named, along with the recent attacks on the Big Four shipping giants, are a clear sign that the shipping industry needs to stop prioritizing the less likely ship hacking scenarios and focus more on its shore-based systems, at least, for the time being.

Source: zdnet


The World Economic Forum cites cyberattacks on critical infrastructure, including transportation, as the world’s fifth highest risk in 2020.1 At the same time, transportation and logistics organizations are rapidly evolving to improve their service levels and efficiency.

To accelerate their digital transformation, Intelligent Transportation Systems (ITS) are becoming more connected and complex, which unfortunately opens the door to new cyber risks. To ensure operational availability during this transition, deep visibility into ITS networks is required.

Let’s look at the challenges faced by the maritime sector, and how they can be eased with ITS cybersecurity best practices and use of the right technology.

 

 

Improving-Maritime-Cybersecurity-Operational-Resiliency-01-BLOG

Maritime cybersecurity and operational resiliency are challenged by increasing digitization and connectivity. Applying cybersecurity best practices and OT/IoT visibility and security technology eases the problem.

 

Maritime Asset Owners Can Reduce Risk with Improved Cybersecurity

The maritime industry transports 90% of the world’s trade.2 Like other industries, it’s becoming increasingly automated and remotely monitored. Shippers want to optimize voyages and track the operational status of things like:

  • Load condition of the vessel
  • Fuel consumption
  • Position and route
  • Machinery performance
  • System efficiencies

Rapid digitization is fueling the development of Maritime Autonomous Systems (MAS), where new generation ships can be remotely controlled from land.

On the other hand, the level of system visibility and cybersecurity maturity in this sector is relatively low. Many ships contain devices and even systems that are unknown to their operators. Crew are not typically trained to identify phishing emails or manage network access control.

While dramatic situations like a vessel capsizing3 due to hacking are not out of the realm of possibility, they are still unlikely. Crew constantly observe ship behavior and can often employ manual or safety systems to correct performance that is out of normal range.

Disruptive events that are more likely to occur include:

  • Employees or suppliers unintentionally causing cyber incidents that threaten operational reliability or are expensive to remediate
  • Cyber criminals disrupting a company’s shipping operations or altering documents to facilitate drug smuggling
  • Threat actors stopping ship-to-shore functions, such as crane operations, and stopping the flow of goods

Driven by the need to reduce risk, comply with international shipping standards,4 and meet insurer requirements, shipping companies are investing in cyber resiliency. An important capability lies in identifying maritime assets and tracking their communications. Networks should be monitored for vulnerabilities, threats, and unusual behavior that could indicate a cyberattack.

Fortunately, real-time OT/IoT visibility technology can be used to improve both operational availability and cyber resiliency, helping ensure the safety of transportation system as they transform.

 

 

Improving-Maritime-Cybersecurity-Operational-Resiliency-02-BLOG

The wide variety of controls and control systems on ships makes them challenging to monitor and secure. Nonetheless, ship owners are improving cybersecurity programs, in part because of international shipping standards.

 

Improving Network and Operational Visibility

The complex technology used within the maritime transportation environment makes consolidated OT/IoT visibility extremely difficult. It also expands the attack surface, increasing vulnerability to cyber threats.

To keep things running smoothly, security and operations teams need a simple way to inventory the wide variety of devices and systems used. The Nozomi Networks solution, for example, provides deep visibility across all control networks by automatically creating an accurate, centralized inventory of OT/IoT assets and keeping it up-to-date.

Our solution analyzes network traffic, using the data to build a live, interactive visualization of operational technology systems. An extensive amount of useful information is provided, including:

  • A macro view of the entire ITS environment, with the ability to filter by subnets and network segments
  • Detailed asset views that make it easy to drill down for deeper insight
  • The role of each node and the traffic between nodes
  • The protocols used to communicate between nodes and zones
  • Network traffic information such as throughput, protocols and open TCP connections
  • Detailed attributes of endpoints and connections
  • Automated alerts that bring hardware, software and device changes to your attention

In fact, the breadth and depth of information often provides insight into previously unknown devices, connections and activity.

 

 

 

1-Automatically-Track-Your-Assets-min

Within minutes of deployment, the Nozomi Networks Solution provides comprehensive visibility into operational networks and ITS/IoT assets. It helps teams efficiently identify and mitigate cybersecurity and reliability risks.

 

Deep Visibility into Transportation ITS Networks Builds Operational Resiliency

To stay on top of what’s happening on transportation system networks, OT/IoT visibility and threat detection is required. Security gaps related to people and processes can have a big impact on operational resiliency too. For example, the separation of IT and OT, combined with increasingly connected ITS control systems, can lead to blind spots and vulnerabilities. But with the right technology and a focus on best practices, transportation organizations can increase operational resiliency.

The Nozomi Networks solution is tailored to meet the unique requirements of transportation asset owners. Many of the world’s top transportation companies have chosen our innovative solution for OT and IoT visibility. It helps them accelerate digital transformation while reducing cyber risk. Find out how it can help you by downloading the document below or contacting us.

 

 

 

Related Content

 

 

 

 

Transportation-IB-v20-thumbnail

Source: securityboulevard


This overview continues the Eazi Security series on practical considerations for Designated Persons Ashore (DPA’s) to ensure full compliance with Resolution MSC 428(98) on maritime cyber security. The requirement to implement effective cyber security measures across a fleet of vessels and in Company offices ashore can be daunting for DPA’s. Particularly as the cyber threat may not be in the direct knowledge and experience of the safety team. Most DPA’s are experienced mariners and have a very well developed sense of what is (and is not) safe with ship-board operations. Cyber security may be outside their technical comfort zone.

However, the important thing for DPA’s to remember is that cyber threats can be assessed using the same methodology as any other maritime risk. The key is to go back to the first principles of safety management.

In particular the ISM Code (Section 1.2 Objectives) requires the following:

  • Ensure safety at sea (i.e. ensure that control systems on board can not be compromised by cyber malware to prevent the safe operation of the vessel, particularly navigation and propulsion systems)
  • Prevention of human injury or loss of life (i.e. IT systems, especially operation systems, are sufficiently protected when used in critical operations involving enhanced risk to people).
  • Damage to the marine environment and property (i.e. bunkering, ballasting and the use of oily water separators).

It is an important point to note that the ISM Code does not specifically require the prevention of commercial risk. This is an interesting point as most cyber crime is committed for commercial gain. Whilst protecting the vessel’s systems to make them safe is a requirement, and will undoubtedly assist against hackers for commercial gain, it is not an explicit requirement of the ISM Code to establish systems solely to prevent commercial wrongdoing . Therefore when implementing enhanced IT security measures the DPA should ask the fundamental question, is this for safety or commercial benefit? If it is only the latter it may be worth considering whether it should be included in the ISM framework (and who should be responsible for the management of that commercial risk).

Moreover, the ISM Code requires the Company to identify risks to its ships, personnel and the environment and thereafter establish appropriate safeguards (ISM Code Section 1.2.2.2). This requirement is usually understood as defining credible risks and put in place measures to manage the risk As Low As Reasonably Practicable (ALARP). DPA’s and Company IT managers should be asking if a cyber threat is credible to their specific operating environment. The subsequent level of protection then needs to be commensurate with the identified cyber threat. It does not need to be bank level security in response to an incredible threat (the equivalent in ship operations terms would be attempts to quantify and manage the risk of a jumbo jet landing on the vessel whilst alongside during cargo operations).

Good cyber security providers have software which will audit the Company’s existing IT systems remotely (usually for a period of a couple of weeks) and report on the actual level of threat the Company is experiencing. This will form the basis of a risk register of known and credible threats. This can then be used to identify a pragmatic and cost effective solution where resources are needed to reduce the known and credible threats to ALARP.

Source: eazisecurity


[The excerpts below are from the book Maritime Cybersecurity: A Guide for Leaders and Managers, published in early September.]

[T]hreats should be put into context. The determine [below] exhibits the sunshine configuration of a vessel that you do not need to see steaming in direction of you at night time. Not solely is that this ship coming in direction of you head-on, it suggests that you’re already in very harmful waters, per Rule 27(f) within the Navigation Guidelines.

Whereas this portrayal has a sure ingredient of darkish humor to it, additionally it is analogous to actual life. When a ship is in a minefield, what’s the actual drawback? Is it the specter of hitting a mine, or is it the vulnerability of the ship to the harm brought on by the explosion? Through the early days of the Battle within the Atlantic throughout World Battle II, Germany deployed magnetic mines in opposition to the British. The mines rose from the seafloor once they detected the small change within the Earth’s magnetic area that occurred when a steel-hulled vessel got here inside vary. The British, upon discovering this mechanism, took countermeasures to successfully degauss their warships. This variation eradicated the mine’s means to take advantage of the ship’s magnetic area and, a minimum of briefly, obviated the risk. The vulnerability of the ship to a mine was not eradicated, however the exploit was defeated.

In our on-line world, we are able to’t management the place the mines are, however we are able to management our susceptibility to getting hit by one and the next harm that would end result.

This results in the next normal fact about cybersecurity:

Vulnerabilities Trump Threats Maxim: If you recognize the vulnerabilities (weaknesses), you’ve bought a shot at understanding the threats (the chance that the weaknesses might be exploited and by whom). Plus, you may even be OK should you get the threats all unsuitable. However should you focus totally on the threats, you’re in all probability in bother.

Threats are a hazard from another person that may trigger hurt or harm. We would or won’t be capable to determine a possible risk, however we can not management them. Vulnerabilities are our personal flaws or weaknesses that may be exploited by a risk actor. Certainly, not all vulnerabilities could be exploited. We’re—or ought to be—in a position to determine our vulnerabilities and appropriate them.

Whereas we can not management the threats, we ought to be educated concerning the risk panorama and have an idea of risk actors who may want to do us hurt, however we must always not obsess over the threats whereas planning a cyberdefense. As a substitute, we must always look inward at our personal techniques, hunt down the vulnerabilities, and plug the holes. New threats at all times emerge, however that doesn’t change the strategic significance of fixing our personal vulnerabilities.

Sarcastically, there’s a corollary to this maxim: “Figuring out threats may help get you funding whereas figuring out vulnerabilities in all probability gained’t.” Virtually all cybersecurity professionals have gone to administration to hunt funds for an emergency replace to {hardware} or software program, simply to be instructed that fixing a susceptible system can at all times wait till the following finances cycle. Conversely, when administration sees a memo from IMO or USCG, or a warning from an ISAC/ISAO, that highlights a reputable risk directed at that very same {hardware} or software program, it’s exceptional how shortly the funds turn into accessible.

——————————————————–

A typical however mistaken perception on the management stage of many organizations, each inside the maritime trade and past, is that the duty for defending info property lies inside the know-how ranks. To those that subscribe to that perception, allow us to share the next: Anybody who thinks that know-how can clear up their issues doesn’t perceive know-how or their issues.

Cybersecurity—or, arguably extra correctly, info safety—isn’t merely, and even primarily, the duty of the IT division. Everybody who is available in contact with info in any form has the duty to guard it and, additional, to acknowledge when it’s beneath assault—and take no matter motion is required to defend it, together with reporting suspected assaults to the suitable defensive businesses inside the group. In the end, it’s the duty of a delegated Chief Data Safety Officer (CISO) to handle the cybersecurity posture of a corporation. That posture contains the creation of a way of urgency and consciousness round cyberthreats at each stage of the group.

It is usually essential to acknowledge that IT and cybersecurity professionals have completely different—albeit usually overlapping—talent units. IT professionals maintain networks working and resilient, and present providers and utility to the customers; cybersecurity professionals defend these property.

——————————————————–

[We wrote this book for] the maritime supervisor, govt, or thought chief who understands their enterprise and the maritime transportation system, however isn’t as aware of points and challenges associated to cybersecurity. Our aim is to assist put together administration to be thought and motion leaders associated to cybersecurity within the maritime area. We assume that the reader is aware of their occupation effectively, information that may assist to supply the perception into how cyber impacts their occupation and group.

Chapter One (The Maritime Transportation System, MTS) offers a broad, high-level overview of the MTS, the assorted parts inside it that we’re attempting to safe, and the dimensions and scope of the problem. Chapter Two (Cybersecurity Fundamentals) provides phrases, ideas, and the vocabulary required to know the articles that one reads and the conferences that one attends that debate cybersecurity.

The subsequent three chapters describe precise cyber incidents in numerous domains of the MTS and their influence on maritime operations. Chapters Three by 5 tackle cyberattacks on delivery strains and different maritime firms, ports, and shipboard networks, respectively. Chapter Six (Navigation Programs) discusses points regarding International Navigation Satellite tv for pc Programs (GNSS) and Computerized Identification System (AIS) spoofing and jamming, whereas Chapter Seven (Industrial Management and Autonomous Programs) presents cyber-related points and the ever-increasing problem of distant management, semi-autonomous, and fully-autonomous techniques discovering their way into the MTS.

Chapter Eight (Methods for Maritime Cyberdefense) discusses practices that tackle cybersecurity operations within the MTS, together with danger mitigation, coaching, the very actual want for a framework of insurance policies and procedures, and the event and implementation of a strong cybersecurity technique. Chapter 9 provides last conclusions and a abstract.

——————————————————–

Creator’s be aware: This guide is meant to talk to all ranges of members of the MTS, from executives, administrators, and ship masters to managers, crew members, and administrative workers. Our hope is that it informs the reader to the next stage of consciousness in order that they are often extra conscious of the threats and be higher ready — at no matter stage of their job — to guard their info property.

As a result of the sphere is so fast-paced, we even have a Web page — www.MaritimeCybersecurityBook.com — the place we are going to submit further info.

Gary C. Kessler is a Professor of Cybersecurity within the Division of Safety Research & Worldwide Affairs at Embry-Riddle Aeronautical College. He’s additionally the president of Gary Kessler Associates, a coaching, research, and consulting firm in Ormond Seashore, Florida.

Steven D. Shepard is the founding father of Shepard Communications Group in Williston, Vermont, co-founder of the Government Crash Course Firm, and founding father of Shepard Photos.

Source: analyticsread


The 01 January 2021 deadline for the implementation of maritime cyber risk management in the Safety Management Systems as per IMO Resolution MSC.428(98) is fast approaching.

Members are reminded of the due date for implementation – the first annual verification of the company’s Document of Compliance after 01 January 2021. While this translates to different target deadlines for each Member and their vessels, it should be recognised that significant preparatory work may be anticipated.

It is also important to acknowledge that the vulnerability of a ship’s systems to a cyber incident continues to be a real threat, as has been experienced in a number of recent high-profile shoreside incidents, such as the “NotPetya” ransomware attack. Whilst that incident did not directly affect vessel operations, the potential vulnerability of on-board systems has been demonstrated by ‘ethical hacking’. Such tests have demonstrated that these attacks, which typically exploit weaknesses in human behaviour, are possible and could result in navigational and control systems being compromised.

In July 2019 the US Coast Guard (USCG) issued a Marine Safety Alert about a cyber incident involving a deep draught vessel on an international voyage and bound for US ports. The vessel reported that it was experiencing a significant cyber incident which affected its shipboard network. A team of experts led by the USCG responded and investigated. It was concluded that although malware had significantly degraded the onboard computer system, essential vessel control systems had not been compromised. The investigation also found that the vessel was operating without effective cyber security measures in place, thereby exposing vulnerabilities of critical vessel control systems. Prior to the incident the security risk presented by the shipboard network was apparently well known to the crew, but this had not been addressed. The USCG stated that it was imperative for the maritime community to adapt to changing technologies and the changing threat landscape by recognising the need for, and implementing basic cyber hygiene measures, thus emphasising the importance of the 2021 cyber security management requirements.

A recently published article on the website of Smart Maritime Network (SMN) explains the vulnerability and ease of access to the communications systems on board vessels where such basic cyber hygiene measures as robust password management was not being implemented.

The Guidelines on CYBER SECURITY ONBOARD SHIPS, produced by BIMCO and supported by a number of maritime stakeholders, is aligned with the MSC resolution and contains recommendations on various processes that should be undertaken for successful implementation of cyber security management.

The NIST (National Institute of Standards and Technology) framework of Identify – Protect – Detect – Respond – Recover sets out the core cyber security activities, the ISM Code and the ISPS Code provides the necessary framework for integration into the company risk management and security protocols and procedures.

The Club has previously recognised the importance of cyber security management on vessel in the loss prevention DVD “Cyber Security – Smart, Safe Shipping”, and Club encourages Members to ensure that early implementation of cyber security management is considered and that the procedures of cyber risk management be seamlessly integrated within the existing safety management system at the earliest opportunity, even where the deadline for implementation is not imminent.

Source: steamshipmutual


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED