116
al., who discuss 46 maritime cyber incidents that
occurredbetween2010and2020[32].
Inlightofthesefindings,oftheincreasedfinancial
value of the sector [27], and of the multitude of
potential attackers, including such with advanced
capabilities, the promotion of cyber security and
safety of the
maritime ecosystem becomes very
important.Maritimeisahighlystandardizedsectors,
andmaritimefunctionsandoperationsaregoverned
bycorrespondingstandardsandregulations.In2017,
the IMO published a circular to promote safe and
secureshippingagainstcyberrisks[23].Accordingto
thecircular,maritimecompaniesmustaddresscyber
risksin
theirSafetyManagementSystem(SMS)by01
January2021.Asof02January2021,thisrequirement
startedtobeverifiedintheDocumentofCompliance
(DOC) audits of maritime companies. The
International Electrotechnical Commission (IEC)
publishedastandardin2021tospecifyrequirements,
testing methods, and required test results against
cyber incidents for shipborne navigational
components,shipborneradioequipmentformingpart
of the Global Maritime Distress and Safety System
(GMDSS), shipborne navigational aids, and Aids to
Navigation(AtoN)[19].
The first step towards strengthening the cyber
security and resilience of an ecosystem is to
understand,analyze,andmanagethecyberrisks
that
itfaces.Severalcyberriskassessmentmethodologies
are available in the literature, some of them
specifically adapted to fit the needs of risk
assessmentsinCyberPhysicalSystems(CPS),suchas
thosefoundonboardvessels.However, theymaybe
challengingtouseforexpertswithamaritimerather
than
a cybersecurity background. It must be noted
that the involvement of sector experts in and their
engagement with the assessment of cyber risks is
paramount to obtaining accurate results. Note also
that statistical data regarding cyber incidents in
maritimeisnotavailableintheliteratureandvarious
risk assessment methods make
certain assumptions,
regarding likelihood of occurrence, cost, and
malicious actors. Therefore, their results depend
heavily on expert judgement. To the best of our
knowledge, a method that is easy for maritime
domain experts to employ whilst also minimizing
subjectivity,isyettobeproposed.
In this paper we propose such
a simple and
effectivecyberriskassessmentmethod,namedCyber
Risk Assessment for SHips (CRASH), that can be
easilyappliedbymaritimeprofessionals.CRASHwas
designedtoreducetheneedforexpertjudgementsin
thecyberriskassessmentprocessformarinesystems.
CRASH employs unveiled cyber threats and
vulnerabilities in the
literature, previous cyber
incidents and shipborne system architectures, to
assesscyberrisks.
The remaining of the paper is organized as
follows: Section 2 presents a review of the related
literature.TheCRASHmethodispresentedinsection
3. Section 4 showcases the workings of CRASH by
applyingittoassess
cyberrisksoftheINS.Insection
5,wepresentthemethodologyforverifyingCRASH
andtheresultsofapplyingit.Finally,section6offers
a summary and recommends some possible future
researchdirections.
2 RELATEDWORK
Severalriskassessmentmethodshavebeenproposed
intheliterature,including[47,2,28,
1,17,4,31]and
several cyber risk assessments by using diverse
methods, including Fine‐Kinney, Attack Tree,
STRIDE,andDREAD,havebeencarriedoutbothfor
conventional vessels and autonomous ships [24, 25,
26,38,42,44].Moreover,worksproposingnovelrisk
assessmentmethodsagainstcyberrisksonboardships
have also appeared in the literature [9, 33, 46]. A
guideline [24] publishedby iTrustpresentspotential
cyber risks and mitigation measures for
communication, navigation, cargo management,
propulsion machinery, and power control systems.
Svilicic et al. [44] present a risk assessment for the
ECDISonatrainingvessel.Shangetal.
[42]offereda
cyber risk assessment method and applied it to a
cyber risk scenario of the ship control system.
Kavallieratosetal.[25,26]adaptedandappliedwell‐
establishedmethods,namelySTRIDEandDREAD,to
assess the cyber risks of CPSs onboard autonomous
ships.Anothermethodforassessingcyber
risksatsea
isCYber‐RiskAssessmentforMarineSystems(CYRA‐
MS),proposedbyBolbotetal.[9].
Cybersecurityriskisassociatedwiththepotential
thatthreatswill exploitvulnerabilitiesof an assetor
group of assets and thereby cause harm to an
organization. Cyber risk is assessed in terms
of the
likelihood of a threat occurring, the extent of the
vulnerabilitiestothethreat,andthemagnitudeofthe
impactshouldthethreatmaterialize;theseconstitute
theelementsofcyberrisk.However,otherchoicesfor
theelementsofriskarepossible.TheSEPmethod[47]
considers Severity, Exposure, and
Probability as
elements of risk. Severity describes potential
consequences,suchasoccupationalillness,injury,and
death. Exposure reflects the required resources for a
consequence,suchastheamountoftime,numberof
cycles, andnumber of people. Probability is defined
asthelikelihoodofaconsequenceoccurring.Severity
and Probability assume
values in the [1, 5] range,
while the value of Exposure ranges in [1, 4]. The
overall risk is calculated as the product of all three
values. The Failure Modes and Effects Analysis
(FMEA) method [2] assesses the failure risk of a
componentorsystem.LikeSEP,italsoassumes
three
elements of risk, namely Severity, Occurrence, and
Detection. Occurrence is the likelihood of failure.
Severity reflects the severity of a consequence, and
Detection represents the detectability of a potential
failure.Scoresforeachelementrangebetween1and
5, and the overall risk score‐called Risk Priority
Number(RPN)‐is
calculatedbymultiplyingthethree
element scores. The Fine‐Kinney method [28] also
assumes three risk elements, namely Consequence,
Likelihood, and Exposure. Consequence reflects
undesirable incidents such as minor first‐aid
accidents, serious injuries, disabilities, and fatalities.
Likelihoodmeasuresthepossibilityofaconsequence,
and Exposure reflects the frequency (e.g.,
daily,
weekly, and monthly) of a potential consequence.
Consequenceisscoredbetween1and100,Likelihood
between0.1and10,andExposurebetween0.5to10.
The risk level is determined by multiplying these
scores.All thesemethods are quantitativeanduse a
linearcombinationofthevaluesoftherisk
elements