According to IBM, transportation has gone from the fifth industry most targeted by cyber criminals in 2015 to the second most targeted sector now. To answer the question of “How can you control a cyberattack?”, Rachael Bardoe, Director of Operations and Cyber Centre of Excellence at DCSA, outlined three key steps below for controlling a cyberattack on a vessel.

“Cybercrime is rising, and shipping is a top target in 2020. An attack at sea is different from one ashore due to limited cyber skillsets, legacy systems and satcom bandwidth constraints. During an incident, systems must fail not just securely, but safely. Controlling an attack requires the following.

Preparation to minimize the impact. Having a Configuration Management Database detailing assets, their criticality and location, is key to prioritizing protection strategies and identifying vulnerabilities. Ensure that patches and anti-virus signatures are up-to-date, security train the crew. Network segmentation is paramount for vessel safety. Maritime systems, OT, IT and crew welfare systems should sit on separate networks, separated by gateways, to contain the attack at network boundaries.

Rapid response to quarantine affected systems. Crew members must follow a Security Incident Response plan to remove affected systems from the network and replace them with spares. Maintaining the chain of custody of impacted systems will facilitate a forensics investigation. Review network ports on boundary devices, ensure that vulnerable ingress and egress points are secured.

Forensics. Once at port, the crew must provide the infected asset to cybersecurity experts for investigation. Maintaining the chain of custody from the point of quarantine ensures any findings will be permissible in court, which may protect the company from serious reputational and financial damage.”




Advocating for Ethics and Transparency in Maritime Asia through independent journalism

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How do you trust organisations when they call you? organisation identity is missing element.

Secure your home with Artificial Intelligence

HOPR (HOPR) Pre-Sale Deposit Address And Instructions On How To Buy HOPRTokens.

IPTV Account sharing — How does that work?

Are You Confident of Spotting a Scam Before it Takes You In?

Network Appliances Secure network design — Part 2

Fyde: Zero Trust architecture and components

Insecure direct object references(IDOR) and Where To Find Them

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Maritime Fairtrade

Maritime Fairtrade

Advocating for Ethics and Transparency in Maritime Asia through independent journalism

More from Medium

How to use Data Cleaning Module in Odoo V15

CS373 Spring 2022: Avi Ghayalod Week 4

Small Teaching in Anthropology: Using Prediction

Capstone Methodology