1 / 2

Cyber Security Guidelines for Better Safety of the Maritime Sector

Cyber security threats in the maritime industry have grown in reach and complexity. From a recent case of malware attack on a floating oil rig to changing directions of a ship by injecting malicious program into ship’s operating systems, maritime industry's exposure to cyber crime is not new.

Download Presentation

Cyber Security Guidelines for Better Safety of the Maritime Sector

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security Guidelines for Better Safety of the Maritime Sector Cyber security threats in the maritime industry have grown in reach and complexity. From a recent case of malware attack on a floating oil rig to changing directions of a ship by injecting malicious program into ship’s operating systems, maritime industry's exposure to cyber crime is not new. As a consequence, cyber security should be considered an integral part of the overall safety management in shipping and offshore operations. The answer to cyber security in the maritime sector lies in a multifaceted approach to manage attacks. Proven cyber security management approaches look at:  Assessing and implementing defensive countermeasures  Monitoring and reviewing effectiveness of security systems  Raising the awareness of all onshore personnel and offshore crews Cyber Security Guidelines 1.Risk Assessment cost global energy companies close to $1.9 billion by 2018. Therefore, it becomes essential for pre-assessing risks and vulnerabilities on your ship. Identify Information Technology (IT) and Operational Technology (OT) systems of the vessel that are vulnerable to cyber attacks. Identify cyber incidents that can be avoided and ship operations that might be affected by cyber threats. Risk assessment is important for ensuring safety of the crew, ship and the marine environment. 2.Reduce Risks need to set strong user access controls and network access controls. It is advisable to use only protected high speed Internet connection. For instance, Fleet Broadband in-built firewalls and white-listing, thereby, protecting your systems from cyberattacks. Perform regular backups of the network and systems connected to it and keep all software up to date. Networks are critical to the operation of a ship itself. They should be controlled. Secure configuration for hardware and software, and email and web browser protection are also essential to avoid infiltration by malware. Consult with a maritime cyber security service provider for getting penetration testing done on your ship network. It is essential to ensure that your assets are secure and safe. 3.Training E training on the importance of maritime cyber security, how to recognize cyberattacks and implementing security policies. E-learning solutions for your crew are pivotal for any cyber security management. The best method to prevent cyber crime in the maritime sector is to increase awareness and implement good practice in the industry. Ship owners, managers and operators have to understand the IT security Cyber Security Guidelines for Better Safety of the Maritime Sector Cyber Security Guidelines Risk Assessment: It has been estimated that cyberattack against oil and gas infrastructure will Reduce Risks: If you are using broadband satellite services or mobile satellite system, then you Fleet Broadband service by Inmarsat has Training Employees mployees: Vessel operators, workers and off shore employees must be provided

  2. of ship networks, automated control systems and software in order to push new guidelines and procedures to manage cyber risks.

More Related