272
and training of the seafarers. The International
Convention on Standards of Training, Certification
and Watchkeeping for Seafarers (STCW) sets the
standards of competence for seafarers internationally
(IMO 2019a). International Maritime Organization
(IMO) has also developed a series of model courses
which provide suggested syllabi, course timetables
and learning objectives to assist instructors to develop
training programs. They allow for maritime
educational institutions to provide training that meets
the STCW Convention standards.
Today, the cybersecurity in the shipping industry
is a big challenge with a multidisciplinary nature for
the shipping companies. Current cybersecurity
strategies implemented by most of the shipping
companies are not able to counter and deter efficiently
intrusions in the maritime cyber domain. The
maritime industry globally has failed to make the
cybersecurity a priority (Caponi & Belmont 2015).
Increasing number of cybersecurity related
incidents in the maritime sector is a clear sign that the
problem is persistent and serious and requires more
attention and actions from the industry. In June 2017
the world's largest container shipping company, A.P.
Møller-Maersk was one of the companies which was
hit by the malware NotPetya (Greenberg 2018). The
infection with malicious software cost Maersk
between $250 and $300 million. In November 2017 the
London-based provider of shipping services Clarkson
PLC confirmed that it was a subject to a cybersecurity
incident which involved unauthorised access to the
company’s computer systems (Clarckson PLC 2017).
COSCO Shipping Lines announced in July 2018 that
the company was hit by the ransomware attack,
which affected its operations in the Americas
(Johnson 2018a). In September 2018 ports of Barcelona
and San Diego were targeted by ransomware
attackers (Johnson 2018b).
Researchers have successfully developed and
demonstrated cyber attacks against the Integrated
Navigation System (INS) and ECDIS (Lund et al.
2018), and have been able to manipulate with GPS
signals (Bhatti & Humphreys 2017).
Seafarers are exposed to a set of different
challenges when in geographical isolation. These can
be pirate attacks, rough seas and stormy weather or a
very busy traffic routes. With the arrival of new
technologies and solutions assisting to sail safely and
securely through these conditions, continuous
interconnection between the critical maritime
infrastructures and also continuous internet access at
sea, the cyber threats have become one of the new
challenges for the seafarers and cybersecurity
awareness is a new item on the agenda of the
maritime community.
Shipowners have to be prepared to cope with the
rising cyber threats. They have to understand that it is
not only the IT issue; the problems also arise among
other from the ship’s crew behaviour in Internet (chat
forums, social media, downloading illegal software,
cloud-based file storage, e-mails) and from third
parties visiting ships (agents, customs, technicians,
surveyors, port officials, vendors, pilots).
Although there has been an increasing awareness
on maritime cybersecurity in the industry, the results
of several surveys reveal that there is still a room for
improvement from the technological and
organisational point of view.
According to the Jones Walker LLP 2018 Maritime
Cybersecurity Survey (Lee & Wogan 2018) only a
minority (36%) of the 126 respondents from maritime
companies across the United States believed that their
own companies were prepared enough in
cybersecurity and 38% of the respondents reported
that cyber attackers targeted their companies in the
past year.
Fairplay and Baltic and International Maritime
Council (BIMCO) are jointly conducting an annual
Maritime Cyber Security Survey in order to examine
how the maritime industry is handling digital
protection. From more than 350 individuals around
the world who participated in the survey in 2018, 22%
admitted of experiencing some kind of a cyber attack
or incident (BIMCO & Fairplay 2018). Top incidents
reported during the survey include: phishing,
infection with malware, spear phishing, theft of
credentials and ransomware.
Another survey undertaken by Futurenautics
Maritime, Crew Connectivity 2018, reveals that 47%
of the seafarers, who responded to the survey, have
sailed on the ship that had become a target of cyber
attack, but 85% of the respondents received no cyber
training at all (Nguyen 2018). Same survey shows also
that 49% of the seafarers confessed that they were
unaware of their employers’ cyber policies, and 41%
thought the responsibility lies with the Master of the
ship.
Although Estonia is considered as a maritime
country, there were no ships with gross tonnage
above 500 under Estonian flag in 2018; last two cargo
ships left the Estonian register in 2014 (Reimer 2014).
Consequently it is complicated to get a full overview
of the companies operating with ships under the flag
of another nation (Hunt et al. 2016). It is believed that
Estonian shipowners own ca 50-60 cargo ships
weighing in excess of 500 tons (Johanson 2016).
In this paper the author presents the results of the
independent survey carried out among the Estonian
shipowners between April 2017 and February 2019.
The results of the surveys indicate that the
cybersecurity hasn’t been the priority for the majority
of the shipowners in Estonia. As the end users are
considered to be the weakest link in cybersecurity,
companies should put more emphasis to the cyber
awareness training of their personnel and crew (Tam
& Jones 2018). You may have the most up-to-date and
expensive equipment, but one careless crew member
can cause extensive damage to the ship and to the
company with just a one click of a mouse.
2 METHODOLOGY
The aim of the research was to find out how much
attention have Estonian shipowners paid to the
increasing cyber threats, whether the organisations
have been the victims of the cyber attacks or incidents
and what steps have they taken in order to reduce the
risks.