44
maintenance, storage, and distribution of information.
Such autonomous systems and processes increase the
vulnerability of maritime information networks
leading to the possible emergence of new types of
cyberattacks.
Operators of coastal and marine networks and
systems are usually convinced that a traditional
antivirus system protects them against cyberattacks
and blame any anomaly on the need to reboot servers,
a system error or a system failure. However,
individual systems in operational technology (OT)
network are insecure because firewall and software
only protect information technology (IT) resources.
Therefore, individual OT endpoints, critical systems,
and components may be sensitive or obsolete, lacking
security updates, which increases vulnerability to
cyberattacks. “Computers, servers, laptops, tablets,
mobile phones and other devices are considered to be
endpoints. The lack of reliable endpoint protection
made it possible to launch such attacks as Petya,
WannaCry, and Bad Rabbit” [9].
Any part of the ship traffic management system, as
well as the cargo handling and security system, can
become vulnerable. Protecting the entire network
from attacks will not solve the vulnerability problem.
You need to protect each information system, encrypt
its data, and adopt advanced user authentication
methods. Unless there is an understanding of the
scope and severity of relevant cyber risks, the ship-
shore system will be deadlocked – “no vision– no
actions”. The OT network has no “dashboard” to
allow operators to see the status of all systems
connected. With vision comes the ability to take
adequate actions and respond to cyber threats. Even
some baseline monitoring and response plan will
make it considerably harder to carry out a “ship
shore” cyberattack, and the resilience of the ship's
information system needs to ensure the reliability of
data storage (commercial, logistics, controlling
technical systems, etc.) on ship servers and local
devices.
It should be recognised that a ship information
system (SIS) is a complex technical system and its
behaviour is described by nonlinear interconnections
and complex interactions with the environment [2, 7,
10]. SIS has specific features: nonlinearity,
heterogeneity, uncertainty, stochasticity, and cyclicity
[11]. The variety of types of ships has led to the fact
that the structures of modern SISs differ significantly,
and developers face a number of serious problems
related, in particular, to conducting a qualitative and
quantitative analysis of systems efficiency in the initial
stages of design.
When synthesizing modern SISs, it is necessary to
take into account the following factors and
parameters: a) complexity – a holistic approach to
automation of technological processes on a ship; b)
efficiency – speed of processing and availability of SIS
data; c) flexibility – the ability to quickly change the
configuration or functional sets of SISs depending on
external environment; d) distribution – a multilayer
structure and hierarchy of SIS servers; e)
interconnection with other networks – the ability to
import and export data arrays in widely accepted data
exchange formats; f) data openness.
The last point is of particular importance and
forms a serious contradiction – the need to increase
the degree of openness for external users and the need
to protect your information. A modern SIS or
shipping company system must have mechanisms for
sharing its data over the Internet – price lists, a list of
services, ads, inside information, etc. It is clear that
developers do not make all data publicly available
and therefore special emphasis should be placed on
protection SISs to prevent unauthorized access to
business data, technical services, control and
identification systems, and ship devices [6], for proper
organization of information access levels.
The relevance of the research topic is connected
with the global crisis and social distancing measures
that prevent IT specialists from being mobile in the
maritime sector and upgrading and maintaining
critical ship OT systems promptly. Such a situation
makes operators neglect security protocols and
therefore ship's control systems and information
networks become vulnerable to hacker attacks.
2 LITERATURE REVIEW AND PROBLEM
STATEMENT
The research [18] by the maritime cybersecurity
company CyberOwl presented at the CyberSecure at
Sea conference showed the results of a survey of 120
IT specialists on cargo shipping. It has been
demonstrated that most specialists lack understanding
not only of the problems of protecting their ship's
networks and devices but also of their overall
structure. Some of them have poor central visibility.
Some identified a lot more opportunities for
connecting “shadow” IT on board the ship. CyberOwl
reports that virtual blindness and lack of data
protection became the current shipping reality.
[22] states that long-term cybersecurity projects are
difficult to implement. They are based on
comprehensive risk assessment, change of network
architecture to improve segmentation, controls
updating and risk management analysis. The issues of
assessment of cyber risks and cyberattacks
consequences on each ship remain unresolved.
As reported on [21], many people still are not able
to detect even the simplest phishing emails used by
hackers to steal personal and corporate information
(via email, messages in social networks, fake websites,
etc.). Even charging a smartphone with a USB port via
an ECDIS terminal (ECDIS, Electronic Chart Display
and Information System) can grant hackers access to
the ship's information systems and lead to data
leakage.
The reason may be not only the lack of
cybersecurity specialists and an up-to-date cyber
incident response plan on board but also exposure of
confidential information, the lack of even primitive
protection. The mentioned challenges may be
overcome through risks identification on each
particular ship, development of appropriate
cyberattack response plans for the crew, and data
encryption. This approach is applied in [18], which
defines the categories of cybersecurity procedures and