Our advantages
  • 1
    10000 completed projects
  • 2
    Optimal terms of work from 8 hours
  • 3
    15-year experience and high qualification of our experts
  • 4
    Turnkey solutions for shipping
  • 5
    Over 500 clients from 200 regions

Cyber Security onboard Ships

In order to improve Cyber Security on ships, we offer information on the new requirements for Cyber Security Onboard Ships.

Information Security - preservation of confidentiality, integrity and availability of information.

There are 3 (three) basic principles that information protection should provide:

  • data integrity — protection against failures leading to the loss of information, as well as protection from unauthorized creation or destruction of data;
  • confidentiality of information;
  • availability of information for all authorized users.

 

ИБ-2017-064-Cyber Security-sm  

Information security is a complex task aimed at ensuring security implemented by the implementation of the information security system. The problem of information security is multifaceted and complex and covers a number of important tasks. In addition, the problems of information security are constantly exacerbated by the processes of penetration into all spheres of society of technical means of data processing and transmission, and, above all, computer systems.

With the development of computer systems, failures or errors which can lead to serious consequences, computer security issues have become a priority. To date, information protection of the network has become almost as important as the safety and security of ships throughout the shipping sector.

The development, understanding and awareness of key aspects of cyber security and safety are highlighted in figure below:

BIMCO-Cyber-Security-Awareness-2016_01-ENG-no comments

 

 

Cyber security approach:

 

  • Identify threats
  • Identify vulnerabilities
  • Assess risk exposure
  • Develop protection and detection measures
  • Establish contingency plans
  • Respond to and recover from cyber security incidents

 

Example visualization of cyber security Bow-Tie components:

Critical Systems

 

Potentially onboard vulnerable systems, equipment and technologies may include:

 

Communication systems:

  • integrated communication systems
  • satellite communication equipment
  • Voice Over Internet Protocols (VOIP) equipment
  • wireless networks (WLANs)
  • public address and general alarm systems.

 

Bridge systems

  • integrated navigation system
  • positioning systems (GPS, etc.)
  • Electronic Chart Display Information System (ECDIS)
  • Dynamic Positioning (DP) systems
  • systems that interface with electronic navigation systems and propulsion/ maneuvering systems
  • Automatic Identification System (AIS)
  • Global Maritime Distress and Safety System (GMDSS)
  • radar equipment
  • Voyage Data Recorders (VDRs)
  • other monitoring and data collection systems.

 

Propulsion and machinery management and power control systems

  • engine governor
  • power management
  • integrated control system
  • alarm system
  • emergency response system.

 

Access control systems

  • surveillance systems such as CCTV network
  • Bridge Navigational Watch Alarm System (BNWAS)
  • Shipboard Security Alarm Systems (SSAS)
  • electronic “personnel-on-board” systems.

 

Cargo management systems

  • Cargo Control Room (CCR) and its equipment
  • level indication system
  • valve remote control system
  • ballast water systems
  • water ingress alarm system.

Passenger servicing and management systems

  • Property Management System (PMS)
  • electronic health records
  • financial related systems
  • ship passenger/seafarer boarding access systems
  • infrastructure support systems like domain naming system (DNS) and user authentication/ authorization systems.

 

Passenger-facing networks

  • passenger Wi-Fi or LAN internet access
  • guest entertainment systems
  • passenger Wi-Fi or Local Area Network (LAN) internet access, for example where onboard personnel can connect their own devices18
  • guest entertainment systems.

 

Core infrastructure systems

  • security gateways
  • routers
  • switches
  • firewalls
  • Virtual Private Network(s) (VPN)
  • Virtual LAN(s) (VLAN)
  • intrusion prevention systems
  • security event logging systems.

 

Administrative and crew welfare systems

  • administrative systems
  • crew Wi-Fi or LAN internet access, for example where onboard personnel can connect their own devices.

Cyber-Security-2

As part of the Safety Management System (SMS), our company offers you the development of appropriate plans and ship procedures for information protection on ships (Cyber Security Management Plan).

News
21.07.24

These Guidelines provide guidance on life cycle GHG intensity assessment for all fuels and other energy carriers (e.g. electricity) used on board a ship and aim at covering the whole fuel life cycle (with specific boundaries), from feedstock extraction/cultivation/ recovery, feedstock conversion to a fuel product, transportation as well as distribution/bunkering, and fuel utilization on board a ship.

15.07.24

This year’s Concentrated Inspection Campaign (CIC), running from 1 September until 30 November 2024, prioritizes seafarers’ basic rights on board ships, and will be carried out on the topic of crew wages and Seafarer Employment Agreements (SEAs) under MLC.

01.07.24
The Hong Kong International Convention for the Safe and Environmentally Sound Recycling of Ships (HKC) will finally enter into force on 26 June 2025.
24.06.24
BIMCO published a revised ship management agreement, “SHIPMAN 2024”, following a two-year review process involving input from shipowners, managers, P&I clubs and insurance and legal experts.
24.06.24
International Chamber of Shipping (ICS) is the global trade association for shipowners and operators.
Submit your application
Leave a request and our specialist will contact you
Adress
18, Bumazhnaya Str., Saint Petersburg, 190020, Russia
Яндекс.Метрика