Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Summary Checklist for Management

Passenger Management systems

Property Management System (PMS)

electronic health records

financial related systems

ship passenger/visitor/seafarer boarding access systems

infrastructure support systems like domain naming system (DNS) and user authentication/authorisation systems

Public networks

passenger Wi-Fi or Local Area Network (LAN) internet access, for example where onboard personnel can connect their own devices

guest entertainment systems

Infrastructure systems

security gateways

routers

switches

firewalls

Virtual Private Network(s) (VPN)

Virtual LAN(s) (VLAN)

intrusion prevention systems

security event logging systems.

Administrative and crew welfare systems

administrative systems

crew Wi-Fi or LAN internet access, for example where onboard personnel can connect their own devices.

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Communication systems

Availability of internet connectivity via satellite and/or other wireless communication can increase the vulnerability of ships. The cyber defence mechanisms implemented by the service provider should be carefully considered but should not be solely relied upon to secure every shipboard system and data. Included in these systems are communication

links to public authorities for transmission of required ship reporting information. Applicable

authentication and access control management requirements by these authorities should be

strictly complied with.

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Summary Checklist for Management

Communication systems

integrated communication systems

satellite communication equipment

Voice Over Internet Protocols (VOIP) equipment

wireless networks (WLANs)

public address and general alarm systems

systems used for reporting mandatory information to public authorities

Bridge systems 

integrated navigation system

positioning systems (GPS, etc.)

Electronic Chart Display Information System (ECDIS)

Dynamic Positioning (DP) systems

systems that interface with electronic navigation systems and propulsion/manoeuvring systems

Automatic Identification System (AIS)

Global Maritime Distress and Safety System (GMDSS)

radar equipment

Voyage Data Recorders (VDRs)

other monitoring and data collection systems.

Engine management and power control systems 

engine governor

power management

integrated control system

alarm system

emergency response system

Control systems 

surveillance systems such as CCTV network

Bridge Navigational Watch Alarm System (BNWAS)

Shipboard Security Alarm Systems (SSAS)

electronic “personnel-on-board” systems

Cargo management systems 

Cargo Control Room (CCR) and its equipment

onboard loading computers and computers used for exchange of loading information and load plan updates with the marine terminal and stevedoring company

remote cargo and container sensing systems

level indication system

valve remote control system

ballast water systems

water ingress alarm system

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Engine management and power control systems

The use of digital systems to monitor and control onboard machinery, propulsion and steering makes such systems vulnerable to cyber-attacks. The vulnerability of these systems can increase when used in conjunction with remote condition-based monitoring and/or are integrated with navigation and communications equipment on ships using integrated bridge systems.

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Control systems

The use of digital systems to monitor and control onboard machinery, propulsion and steering makes such systems vulnerable to cyber-attacks. The vulnerability of these systems can increase when used in conjunction with remote condition-based monitoring and/or are integrated with navigation and communications equipment on ships using integrated bridge systems.

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Passenger Management Systems

Digital systems used for property management, boarding and access control may hold valuable passenger related data. Intelligent devices (tablets, handheld scanners etc.) are themselves an attack vector as ultimately the collected data is passed on to other systems.

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Public networks

Fixed or wireless networks connected to the internet, installed on board for the benefit of passengers, for example guest entertainment systems, should be considered uncontrolled and should not be connected to any safety critical system on board.

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Administrative and crew welfare systems

Onboard computer networks used for administration of the ship or the welfare of the crew are particularly vulnerable when providing internet access and email. This can be exploited by cyber attackers to gain access to onboard systems and data.

These systems should be considered uncontrolled and should not be connected to any safety critical system on board. Software provided by ship management companies or owners is also included in this category.

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Cargo management systems

Digital systems used for the loading, management and control of cargo, including hazardous cargo, may interface with a variety of systems ashore, including ports, marine terminals. Such systems may include shipment-tracking tools available to shippers via the internet. However, the tracking is usually done via the company’s systems connected to the ship and not directly between the shipper and the ship. Interfaces of this kind make cargo management systems and data in cargo manifests and loading lists vulnerable to cyber-attacks.

Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Bridge systems

The increasing use of digital, network navigation systems, with interfaces to shoreside networks for update and provision of services, make such systems vulnerable to cyber-attacks. Bridge systems that are not connected to other networks may be equally vulnerable, as removable media are often used to update such systems from other controlled or uncontrolled networks. A cyber incident can extend to service denial or manipulation and, therefore, may affect all systems associated with navigation, including ECDIS, GNSS, AIS, VDR and Radar/ARPA.