Close
(0) items
You have no items in your shopping cart.
All Categories
    Filters
    Currency
    Search
    Manufacturer: Witherbys

    Cyber Security Workbook for On Board Ship Use - 3rd Edition 2022

    £225.00
    This is a practical and easy to understand guide to support the Master and the ship’s crew with cyber security risk management. It provides detailed guidance on all aspects of cyber security protection, defence and response (including new sections on remote access, intrusion detection systems and engine department considerations).
    ISBN: BP105458
    *

    Please select the required format.

    Ship to
    *
    *
    Shipping Method
    Name
    Estimated Delivery
    Price
    No shipping options

    Published: October 2021

    Author: BIMCO, International Chamber of Shipping

    This is a practical and easy to understand guide to support the Master and the ship’s crew with cyber security risk management. It provides detailed guidance on all aspects of cyber security protection, defence and response (including new sections on remote access, intrusion detection systems and engine department considerations). It also includes comprehensive checklists to assist with the practical, day-to-day management of onboard cyber security.

    'Cyber Security Workbook for On Board Ship Use' is referenced in ISGOTT Sixth Edition as a source of practical guidance for Masters and ship’s crew (ref: ISGOTT 6, section 6.4, para.3).

     

    In recent years, the shipping industry has undergone a digital revolution: internet connectivity on board has become common and ship’s systems are increasingly digitised and integrated. With this growing level of connection, comes greater risk. Ships are now a common target for hackers and it has become crucial that the entire crew has an understanding of how and when cyber attacks can occur.

    Using detailed, step by step checklists, Cyber Security Workbook for On Board Ship Use provides a ship’s Security Officer with the practical skills to identify cyber risks and to protect vulnerable onboard systems. It also gives guidance on how best to detect, respond and recover in the event of a cyber attack.

    This workbook will help to ensure that cyber risks are appropriately addressed in the onboard SMS (as required by IMO Resolution MSC.428(98)). It will also benefit shipowners, ship managers, ports and their IT departments.

    This publication has been produced by BIMCO, ICS (International Chamber of Shipping) and Witherby Publishing Group.

     

     

    Content

    Section:1 – Introduction
    1.1 Cyber Security Risk Management – IMO Requirements and Guidelines
    1.1.1 Supporting Regulatory Guidelines
    1.2 Cyber Outlook for Shipping
    1.3 Purpose of this Workbook
    1.4 Checklists
    Section:2 – Identifying Risks
    2.1 Vulnerable Ship Systems
    2.2 What is a Cyber Attack?
    2.2.1 Attacker Profiles
    2.2.2 Types of Cyber Attack
    Section:3 – Protection, Prevention and Training
    3.1 Prevention of Malware Attacks
    3.2 Software Updates
    3.3 Endpoint Protection
    3.3.1 Anti-virus
    3.4 Passwords
    3.5 Cyber Security and the SMS
    3.5.1 Cyber Security and the Ship Security Plan (SSP)
    3.6 Crew Training
    3.6.1 Ship Cyber Security Drill
    3.6.2 Cyber Security Familiarisation
    3.6.3 Crew Training Cyber Security Checklist
    Section:4 – Detect, Respond and Recover: General Principles
    4.1 Detecting a Cyber Incident
    4.2 Detecting a Cyber Incident Checklist
    4.3 Incident Response
    4.3.1 Third Party Support
    4.3.2 Cyber Recovery Plan
    4.3.3 Backups
    4.4 Responding to a Cyber Incident On Board
    Section:5 – Detect, Respond and Recover: Ship’s Business Systems
    5.1 Onboard Business Computers
    5.1.1 USB Ports and Drives
    5.1.2 USB Cleaning Stations
    5.1.3 Personal Devices and USB Ports
    5.1.4 Onboard Business Computer Checklist
    5.2 Network Segregation On Board
    5.2.1 Existing/Simple Networks
    5.2.2 Segregated Networks
    5.2.3 Achieving a Segregated Network
    5.2.4 Maintaining a Segregated Network
    5.2.5 Benefits of Network Segregation
    5.2.6 Vulnerable Systems On Board
    5.3 Network Segregation Checklist
    5.4 Wireless Networks
    5.4.1 Business WiFi
    5.4.2 Crew WiFi
    5.4.3 Guest Access
    5.4.4 WiFi Network Security
    5.4.5 Virtual Private Network (VPN)
    5.4.6 Networks (Wireless and Wired)
    5.5 Satellite Communications Equipment
    5.5.1 Satcom Passwords
    5.5.2 Admin Password Security
    5.5.3 Confirming that the Satcom System is Not Available from the Public Internet
    5.5.4 Is the Software Running on the Satcom System Kept Up to Date?
    5.5.5 Applying Updates to Satellite Terminals
    5.5.6 Physical Security of the Satellite Terminal
    5.5.7 Software Security of the Satellite System
    5.5.8 Satellite Communications
    5.6 Cellular Data Connections
    5.7 Connecting to Shore WiFi in Port
    5.7.1 Crew Connecting to WiFi Ashore
    5.7.2 Shore WiFi in Port/Shore Cellular Data Checklist
    Section:6 – Detect, Respond and Recover: OT Systems
    6.1 Understanding OT Systems
    6.2 Engine Department Considerations
    6.3 OT Systems Checklist for Crew
    6.4 ECDIS Security
    6.4.1 Updates
    6.4.2 Physical Security
    6.4.3 ECDIS Recovery
    6.4.4 Recognising Genuine NAVTEX Messages
    6.4.5 ECDIS Cyber Security Checklist
    6.5 GNSS Security
    6.5.1 GNSS Input Data
    6.6 Cyber Security Checks on the Navigation Bridge during Watchkeeping
    Section:7 – OT Cyber Security: Onshore Office and IT Department
    Considerations
    7.1 Ship’s Network Architecture
    7.1.1 IDMZ
    7.1.2 Data Diodes (unidirectional (single direction) gateways)
    7.2 OT Asset Management and Risk Assessment
    7.2.1 Asset Management
    7.2.2 Asset Risk Assessment
    7.2.3 Asset Management and Risk Assessment Checklist
    7.3 Securing OT Systems
    7.4 Securing the Ethernet IP Network Used by OT Systems
    7.4.1 Converter Security
    7.5 Remote Access
    7.5.1 Remote Access Checklist
    7.6 Intrusion Detection Systems (IDS)
    7.7 OT Systems Checklist for IT Department/Onshore Office
    Annex 1 – Regional Regulatory Guidance
    Annex 2 – Checking for Windows Updates
    Annex 3 – Creating User Accounts
    Annex 4 – Checking for Segregated Networks
    Annex 5 – How to Check that Anti-virus Software Updates are Applied
    Annex 6 – NMEA 0183
    Annex 7 – Example of a Cyber Security Familiarisation Checklist for New Crew Members
    Annex 8 – Planning a Crew Training Session
    Annex 9 – Further Resources

    Witherby Connect is the new online library solution for the maritime industry. Created by Witherbys’ in-house development team, Witherby Connect provides users with streamlined access to all major industry publications. 

    The browser-based hybrid software means that there is nothing to install and after publications are saved to the browser cache they can be accessed almost instantly both on and offline. This solution delivers more flexibility and security for those working at sea.

    Use on and offline: Witherby Connect provides flexible access. Publications can be viewed while connected to the internet and are downloaded to the browser’s cache for access offline, making it suitable for use even when internet access cannot be guaranteed.

    You can access Witherby Connect on any modern browser including: Google Chrome, Microsoft Edge, Mozilla Firefox and Apple Safari.

    Published: October 2021

    Author: BIMCO, International Chamber of Shipping

    This is a practical and easy to understand guide to support the Master and the ship’s crew with cyber security risk management. It provides detailed guidance on all aspects of cyber security protection, defence and response (including new sections on remote access, intrusion detection systems and engine department considerations). It also includes comprehensive checklists to assist with the practical, day-to-day management of onboard cyber security.

    'Cyber Security Workbook for On Board Ship Use' is referenced in ISGOTT Sixth Edition as a source of practical guidance for Masters and ship’s crew (ref: ISGOTT 6, section 6.4, para.3).

     

    In recent years, the shipping industry has undergone a digital revolution: internet connectivity on board has become common and ship’s systems are increasingly digitised and integrated. With this growing level of connection, comes greater risk. Ships are now a common target for hackers and it has become crucial that the entire crew has an understanding of how and when cyber attacks can occur.

    Using detailed, step by step checklists, Cyber Security Workbook for On Board Ship Use provides a ship’s Security Officer with the practical skills to identify cyber risks and to protect vulnerable onboard systems. It also gives guidance on how best to detect, respond and recover in the event of a cyber attack.

    This workbook will help to ensure that cyber risks are appropriately addressed in the onboard SMS (as required by IMO Resolution MSC.428(98)). It will also benefit shipowners, ship managers, ports and their IT departments.

    This publication has been produced by BIMCO, ICS (International Chamber of Shipping) and Witherby Publishing Group.

     

     

    Content

    Section:1 – Introduction
    1.1 Cyber Security Risk Management – IMO Requirements and Guidelines
    1.1.1 Supporting Regulatory Guidelines
    1.2 Cyber Outlook for Shipping
    1.3 Purpose of this Workbook
    1.4 Checklists
    Section:2 – Identifying Risks
    2.1 Vulnerable Ship Systems
    2.2 What is a Cyber Attack?
    2.2.1 Attacker Profiles
    2.2.2 Types of Cyber Attack
    Section:3 – Protection, Prevention and Training
    3.1 Prevention of Malware Attacks
    3.2 Software Updates
    3.3 Endpoint Protection
    3.3.1 Anti-virus
    3.4 Passwords
    3.5 Cyber Security and the SMS
    3.5.1 Cyber Security and the Ship Security Plan (SSP)
    3.6 Crew Training
    3.6.1 Ship Cyber Security Drill
    3.6.2 Cyber Security Familiarisation
    3.6.3 Crew Training Cyber Security Checklist
    Section:4 – Detect, Respond and Recover: General Principles
    4.1 Detecting a Cyber Incident
    4.2 Detecting a Cyber Incident Checklist
    4.3 Incident Response
    4.3.1 Third Party Support
    4.3.2 Cyber Recovery Plan
    4.3.3 Backups
    4.4 Responding to a Cyber Incident On Board
    Section:5 – Detect, Respond and Recover: Ship’s Business Systems
    5.1 Onboard Business Computers
    5.1.1 USB Ports and Drives
    5.1.2 USB Cleaning Stations
    5.1.3 Personal Devices and USB Ports
    5.1.4 Onboard Business Computer Checklist
    5.2 Network Segregation On Board
    5.2.1 Existing/Simple Networks
    5.2.2 Segregated Networks
    5.2.3 Achieving a Segregated Network
    5.2.4 Maintaining a Segregated Network
    5.2.5 Benefits of Network Segregation
    5.2.6 Vulnerable Systems On Board
    5.3 Network Segregation Checklist
    5.4 Wireless Networks
    5.4.1 Business WiFi
    5.4.2 Crew WiFi
    5.4.3 Guest Access
    5.4.4 WiFi Network Security
    5.4.5 Virtual Private Network (VPN)
    5.4.6 Networks (Wireless and Wired)
    5.5 Satellite Communications Equipment
    5.5.1 Satcom Passwords
    5.5.2 Admin Password Security
    5.5.3 Confirming that the Satcom System is Not Available from the Public Internet
    5.5.4 Is the Software Running on the Satcom System Kept Up to Date?
    5.5.5 Applying Updates to Satellite Terminals
    5.5.6 Physical Security of the Satellite Terminal
    5.5.7 Software Security of the Satellite System
    5.5.8 Satellite Communications
    5.6 Cellular Data Connections
    5.7 Connecting to Shore WiFi in Port
    5.7.1 Crew Connecting to WiFi Ashore
    5.7.2 Shore WiFi in Port/Shore Cellular Data Checklist
    Section:6 – Detect, Respond and Recover: OT Systems
    6.1 Understanding OT Systems
    6.2 Engine Department Considerations
    6.3 OT Systems Checklist for Crew
    6.4 ECDIS Security
    6.4.1 Updates
    6.4.2 Physical Security
    6.4.3 ECDIS Recovery
    6.4.4 Recognising Genuine NAVTEX Messages
    6.4.5 ECDIS Cyber Security Checklist
    6.5 GNSS Security
    6.5.1 GNSS Input Data
    6.6 Cyber Security Checks on the Navigation Bridge during Watchkeeping
    Section:7 – OT Cyber Security: Onshore Office and IT Department
    Considerations
    7.1 Ship’s Network Architecture
    7.1.1 IDMZ
    7.1.2 Data Diodes (unidirectional (single direction) gateways)
    7.2 OT Asset Management and Risk Assessment
    7.2.1 Asset Management
    7.2.2 Asset Risk Assessment
    7.2.3 Asset Management and Risk Assessment Checklist
    7.3 Securing OT Systems
    7.4 Securing the Ethernet IP Network Used by OT Systems
    7.4.1 Converter Security
    7.5 Remote Access
    7.5.1 Remote Access Checklist
    7.6 Intrusion Detection Systems (IDS)
    7.7 OT Systems Checklist for IT Department/Onshore Office
    Annex 1 – Regional Regulatory Guidance
    Annex 2 – Checking for Windows Updates
    Annex 3 – Creating User Accounts
    Annex 4 – Checking for Segregated Networks
    Annex 5 – How to Check that Anti-virus Software Updates are Applied
    Annex 6 – NMEA 0183
    Annex 7 – Example of a Cyber Security Familiarisation Checklist for New Crew Members
    Annex 8 – Planning a Crew Training Session
    Annex 9 – Further Resources

    Product tags