Close
(0) items
You have no items in your shopping cart.
All Categories
    Filters
    Currency
    Search
    Manufacturer: Witherbys

    Cyber Security Workbook for On Board Ship Use - 6th Edition 2025

    £295.00
    Physical book is due to be available in stock in October 2024.
    ISBN: 9781917308083
    *

    Please select the required format.

    Ship to
    *
    *
    Shipping Method
    Name
    Estimated Delivery
    Price
    No shipping options

    Published: September 2024

    Author: BIMCO, International Chamber of Shipping and Witherby Publishing Group

    This practical and easy to understand workbook supports the owner, Master and the ship's crew with cyber security risk management.

    It contains comprehensive checklists to support the day-to-day management of onboard cyber security and facilitates collaboration between ships, onshore IT departments and equipment manufacturers.

    Cyber risk management should be an inherent part of safety and security and should be considered at all levels of the company, including senior management ashore and onboard personnel.

    This Workbook has been designed as a practical, straightforward guide to support the Master and officers on board ship (Part I ? Onboard Practical Considerations). It is designed to facilitate understanding and good collaboration between individual ships, onshore IT departments and equipment manufacturers (Part II ? Shore Management Considerations). The Workbook may also be useful to the wider maritime industry.

    The sixth edition has been produced and supported by BIMCO and the International Chamber of Shipping (ICS).

    The Workbook has been fully revised and updated and contains new guidance on:

    • Industry guidelines and regulatory requirements, including IACS UR E26 and E27
    • cyber security in port
    • ship inspections and port state control
    • malware detection and prevention
    • phishing risks.

    Detailed case studies and diagrams have been added to help illustrate cyber risks. The Workbook contains 14 checklists and 7 annexes, including Cyber Security Risk Assessment and Creating a Cyber Security Plan.

    Table of Contents

    Foreword
    Abbreviations/Definitions
    Introduction
    Section 1 - Regulations and Guidance
    1.1 IMO Requirements
    1.1.1 Designated Roles and Responsibilities
    1.2 The Guidelines on Cyber Security Onboard Ships
    1.3 Additional Industry Guidelines
    1.3.1 IACS (International Association of Classification Societies)
    1.3.2 Non-Governmental Organisaitons (NGOs)
    1.4 Regional Regulatory Guidance
    1.4.1 UK
    1.4.2 EU
    1.4.3 USA
    1.5 Guidance on Mitigation Strategies for IT
    1.5.1 Essential Eight Maturity Model
    1.5.2 Cyber Essentials
    1.5.3 IMO Insider Threat Toolkit

    Part One - Onboard Practical Considerations
    Section 2 - Identifying Risks
    2.1 Vulnerable Ship Systems
    2.2 What is a Maritime Cyber Attack?
    2.3 Threats
    2.4 Types of Cyber Attack
    2.5 Social Engineering
    2.5.1 Tailgating
    2.5.2 Email Phishing
    2.5.3 Spear Phishing
    2.5.4 Man-in-the-Middle Attacks
    2.5.5 Phone or text messages
    2.5.6 Multi-Factor Authentication Phishing
    2.6 Ransomware
    Section 3 - Protection and Prevention: General Principles
    3.1 Prevention of Malware Attacks
    3.2 Software Updates
    3.2.1 Updating Programs that are not Part of the Operating System
    3.3 Endpoint Protection/Security Suite
    3.3.1 Endpoint Protection Updates
    3.3.2 Checking Whether the Endpoint Protection Suite is up to Date
    3.3.3 Other Security Tools in Windows
    3.4 Passwords
    3.4.1 Creating Passwords
    3.4.2 Password Length
    3.4.3 Managing Passwords
    3.4.4 Handover of Passwords
    3.4.5 Passkeys
    3.4.6 Usernames
    3.5 Cyber Security and the SMS
    3.5.1 Cyber Security and the Ship Security Plan (SSP)
    3.6 Ship Inspections and Port State Control
    3.6.1 Focus of Inspections
    3.6.2 US Port State Control
    3.6.3 European Union
    3.6.4 Other Inspections
    Section 4 - Crew Considerations and Training
    4.1 Key Aspects of Crew Training
    4.2 Cyber Security Familiarisation for Crew
    4.3 Training for Non-crewmembers
    4.4 Designing a Training Programme
    4.5 Unintentional Cyber Breaches by the Crew
    4.6 Planning a Crew Training Session
    4.7 Cyber Security Drills
    4.7.1 Generic Drill Scenario
    4.8 Social Media
    4.9 Travelling in Cyber Safe Mode
    Section 5 - Detect, Respond and Recover: General Principles
    5.1 Detecting a Cyber Incident
    5.1.1 Introduction
    5.1.2 Useful Tools Available to Help Detect Possible Malware
    5.2 Incident Response
    5.2.1 Third-party Support
    5.2.2 Cyber Recovery Plan
    5.2.3 Backups
    Section 6 - External Communications and Ship in Port
    6.1 Satellite Communications (Satcom) Equipment
    6.1.1 Satcom Passwords
    6.1.2 Satcom Visibility on the Public Internet
    6.1.3 Satcom Software Updates
    6.1.4 Physical Security of the Satellite Terminal
    6.1.5 Software Security of the Satellite System
    6.2 Cyber Security Risks in Port
    6.2.1 Mobile (Cellular) Data Connections
    6.2.2 Connecting to Shore WiFi in Port
    Section 7 - Ship's Business Systems
    7.1 Network Segregation On Board
    7.1.1 Segregated Networks
    7.1.2 Achieving a Segregated Network
    7.1.3 Maintaining a Segregated Network
    7.1.4 Benefits of Network Segregation
    7.1.5 Vulnerable Systems On Board
    7.1.6 Defence in Breadth and Depth
    7.2 Wireless Networks On Board
    7.2.1 Business WiFi
    7.2.2 Crew WiFi
    7.2.3 Guest Access
    7.2.4 WiFi Network Security
    7.2.5 Virtual Private Network (VPN)
    7.3 Onboard Business Computers
    7.3.1 USB Ports and Drives
    7.3.2 USB Port Blockers
    7.3.3 USB Cleaning Stations
    7.3.4 Tablets
    7.3.5 Personal Devices and USB Ports
    7.3.6 Configuring Business Computers to Minimise the Risks of Cyber Attack
    7.4 Passenger Ship IT Systems
    7.4.1 Passenger Services
    7.4.2 Other Considerations
    Section 8 - OT Systems
    8.1 Understanding OT Systems
    8.2 Engine Department Considerations
    8.3 Cargo Management
    8.4 ECDIS Security
    8.4.1 Updates
    8.4.2 Physical Security
    8.4.3 ECDIS Recovery
    8.4.4 Recognising Genuine NAVTEX Messages
    8.4.5 Digital navigational data system (NAVDAT)
    8.5 GNSS Security
    8.5.1 GNSS Input Data
    8.6 Other Bridge Systems
    8.6.1 VDR
    8.6.2 AIS

    Part Two - Shore Management Considerations
    Section 9 - Key Considerations
    9.1 Cooperation Between the Office Departments and their Suppliers
    9.1.1 IT Department and Technical Department
    9.1.2 Securing the Supply Chain
    9.1.3 Company Cyber Security Working Group
    9.2 Cooperation Between the Office and the Ship?s Crew
    9.2.1 Maritime Cyber Security Management
    9.2.2 Cyber Security and the Safety Management System (SMS)
    9.2.3 Cyber Security and the Ship Security Plan (SSP)
    9.2.4 Onboard Resources According to Ship Type
    9.3 Ship's Network Architecture
    9.3.1 IDMZ
    9.3.2 Data Diodes (Unidirectional Gateways)
    Section 10 - OT Systems Management
    10.1 OT Asset Management and Risk Assessment
    10.1.1 Asset Management
    10.1.2 Asset Risk Assessment
    10.2 Securing OT Systems
    10.3 Securing the Ethernet IP Network Used by OT Systems
    10.3.1 Converter Security
    10.4 Intrusion Detection Systems (IDS)
    Section 11 - IT Systems Management
    11.1 Remote Access
    11.1.1 Protection Measures
    11.2 Vulnerability Scanning (Cyber Audit)
    11.2.1 Performing a Vulnerability Scan
    11.3 Penetration (Pen) Testing
    11.3.1 Carrying out a Pen Test
    11.3.2 Benefits of a Pen Test
    11.4 Endpoint Detection and Response (EDR)
    11.4.1 Extended Detection and Response (XDR)
    11.5 Disaster Recovery from Backup
    11.5.1 Backup Strategy
    11.6 Uninterruptible Power Supply (UPS) for IT/OT Systems

    Checklists
    Checklist 1 - Cyber Security Familiarisation for New Crewmembers
    Checklist 2 - Cyber Security Crew Training
    Checklist 3 - Detecting a Cyber Incident
    Checklist 4 - Responding to a Cyber Incident On Board
    Checklist 5 - Onboard Business Computer
    Checklist 6 - Network Segregation
    Checklist 7 - Networks (Wireless and Wired)
    Checklist 8 - Satellite Communications
    Checklist 9 - OT Systems for Crew
    Checklist 10 - ECDIS Cyber Security
    Checklist 11 - Cyber Security Checks on the Navigation Bridge
    Checklist 12 - Asset Management and Risk Assessment
    Checklist 13 - OT Systems for IT Department
    Checklist 14 - Remote Access

    Witherby Connect is the new online library solution for the maritime industry. Created by Witherbys’ in-house development team, Witherby Connect provides users with streamlined access to all major industry publications.

    The browser-based hybrid software means that there is nothing to install and after publications are saved to the browser cache they can be accessed almost instantly both on and offline. This solution delivers more flexibility and security for those working at sea.

    Use on and offline: Witherby Connect provides flexible access. Publications can be viewed while connected to the internet and are downloaded to the browser’s cache for access offline, making it suitable for use even when internet access cannot be guaranteed.

    You can access Witherby Connect on any modern browser including: Google Chrome, Microsoft Edge, Mozilla Firefox and Apple Safari.

    Published: September 2024

    Author: BIMCO, International Chamber of Shipping and Witherby Publishing Group

    This practical and easy to understand workbook supports the owner, Master and the ship's crew with cyber security risk management.

    It contains comprehensive checklists to support the day-to-day management of onboard cyber security and facilitates collaboration between ships, onshore IT departments and equipment manufacturers.

    Cyber risk management should be an inherent part of safety and security and should be considered at all levels of the company, including senior management ashore and onboard personnel.

    This Workbook has been designed as a practical, straightforward guide to support the Master and officers on board ship (Part I ? Onboard Practical Considerations). It is designed to facilitate understanding and good collaboration between individual ships, onshore IT departments and equipment manufacturers (Part II ? Shore Management Considerations). The Workbook may also be useful to the wider maritime industry.

    The sixth edition has been produced and supported by BIMCO and the International Chamber of Shipping (ICS).

    The Workbook has been fully revised and updated and contains new guidance on:

    • Industry guidelines and regulatory requirements, including IACS UR E26 and E27
    • cyber security in port
    • ship inspections and port state control
    • malware detection and prevention
    • phishing risks.

    Detailed case studies and diagrams have been added to help illustrate cyber risks. The Workbook contains 14 checklists and 7 annexes, including Cyber Security Risk Assessment and Creating a Cyber Security Plan.

    Table of Contents

    Foreword
    Abbreviations/Definitions
    Introduction
    Section 1 - Regulations and Guidance
    1.1 IMO Requirements
    1.1.1 Designated Roles and Responsibilities
    1.2 The Guidelines on Cyber Security Onboard Ships
    1.3 Additional Industry Guidelines
    1.3.1 IACS (International Association of Classification Societies)
    1.3.2 Non-Governmental Organisaitons (NGOs)
    1.4 Regional Regulatory Guidance
    1.4.1 UK
    1.4.2 EU
    1.4.3 USA
    1.5 Guidance on Mitigation Strategies for IT
    1.5.1 Essential Eight Maturity Model
    1.5.2 Cyber Essentials
    1.5.3 IMO Insider Threat Toolkit

    Part One - Onboard Practical Considerations
    Section 2 - Identifying Risks
    2.1 Vulnerable Ship Systems
    2.2 What is a Maritime Cyber Attack?
    2.3 Threats
    2.4 Types of Cyber Attack
    2.5 Social Engineering
    2.5.1 Tailgating
    2.5.2 Email Phishing
    2.5.3 Spear Phishing
    2.5.4 Man-in-the-Middle Attacks
    2.5.5 Phone or text messages
    2.5.6 Multi-Factor Authentication Phishing
    2.6 Ransomware
    Section 3 - Protection and Prevention: General Principles
    3.1 Prevention of Malware Attacks
    3.2 Software Updates
    3.2.1 Updating Programs that are not Part of the Operating System
    3.3 Endpoint Protection/Security Suite
    3.3.1 Endpoint Protection Updates
    3.3.2 Checking Whether the Endpoint Protection Suite is up to Date
    3.3.3 Other Security Tools in Windows
    3.4 Passwords
    3.4.1 Creating Passwords
    3.4.2 Password Length
    3.4.3 Managing Passwords
    3.4.4 Handover of Passwords
    3.4.5 Passkeys
    3.4.6 Usernames
    3.5 Cyber Security and the SMS
    3.5.1 Cyber Security and the Ship Security Plan (SSP)
    3.6 Ship Inspections and Port State Control
    3.6.1 Focus of Inspections
    3.6.2 US Port State Control
    3.6.3 European Union
    3.6.4 Other Inspections
    Section 4 - Crew Considerations and Training
    4.1 Key Aspects of Crew Training
    4.2 Cyber Security Familiarisation for Crew
    4.3 Training for Non-crewmembers
    4.4 Designing a Training Programme
    4.5 Unintentional Cyber Breaches by the Crew
    4.6 Planning a Crew Training Session
    4.7 Cyber Security Drills
    4.7.1 Generic Drill Scenario
    4.8 Social Media
    4.9 Travelling in Cyber Safe Mode
    Section 5 - Detect, Respond and Recover: General Principles
    5.1 Detecting a Cyber Incident
    5.1.1 Introduction
    5.1.2 Useful Tools Available to Help Detect Possible Malware
    5.2 Incident Response
    5.2.1 Third-party Support
    5.2.2 Cyber Recovery Plan
    5.2.3 Backups
    Section 6 - External Communications and Ship in Port
    6.1 Satellite Communications (Satcom) Equipment
    6.1.1 Satcom Passwords
    6.1.2 Satcom Visibility on the Public Internet
    6.1.3 Satcom Software Updates
    6.1.4 Physical Security of the Satellite Terminal
    6.1.5 Software Security of the Satellite System
    6.2 Cyber Security Risks in Port
    6.2.1 Mobile (Cellular) Data Connections
    6.2.2 Connecting to Shore WiFi in Port
    Section 7 - Ship's Business Systems
    7.1 Network Segregation On Board
    7.1.1 Segregated Networks
    7.1.2 Achieving a Segregated Network
    7.1.3 Maintaining a Segregated Network
    7.1.4 Benefits of Network Segregation
    7.1.5 Vulnerable Systems On Board
    7.1.6 Defence in Breadth and Depth
    7.2 Wireless Networks On Board
    7.2.1 Business WiFi
    7.2.2 Crew WiFi
    7.2.3 Guest Access
    7.2.4 WiFi Network Security
    7.2.5 Virtual Private Network (VPN)
    7.3 Onboard Business Computers
    7.3.1 USB Ports and Drives
    7.3.2 USB Port Blockers
    7.3.3 USB Cleaning Stations
    7.3.4 Tablets
    7.3.5 Personal Devices and USB Ports
    7.3.6 Configuring Business Computers to Minimise the Risks of Cyber Attack
    7.4 Passenger Ship IT Systems
    7.4.1 Passenger Services
    7.4.2 Other Considerations
    Section 8 - OT Systems
    8.1 Understanding OT Systems
    8.2 Engine Department Considerations
    8.3 Cargo Management
    8.4 ECDIS Security
    8.4.1 Updates
    8.4.2 Physical Security
    8.4.3 ECDIS Recovery
    8.4.4 Recognising Genuine NAVTEX Messages
    8.4.5 Digital navigational data system (NAVDAT)
    8.5 GNSS Security
    8.5.1 GNSS Input Data
    8.6 Other Bridge Systems
    8.6.1 VDR
    8.6.2 AIS

    Part Two - Shore Management Considerations
    Section 9 - Key Considerations
    9.1 Cooperation Between the Office Departments and their Suppliers
    9.1.1 IT Department and Technical Department
    9.1.2 Securing the Supply Chain
    9.1.3 Company Cyber Security Working Group
    9.2 Cooperation Between the Office and the Ship?s Crew
    9.2.1 Maritime Cyber Security Management
    9.2.2 Cyber Security and the Safety Management System (SMS)
    9.2.3 Cyber Security and the Ship Security Plan (SSP)
    9.2.4 Onboard Resources According to Ship Type
    9.3 Ship's Network Architecture
    9.3.1 IDMZ
    9.3.2 Data Diodes (Unidirectional Gateways)
    Section 10 - OT Systems Management
    10.1 OT Asset Management and Risk Assessment
    10.1.1 Asset Management
    10.1.2 Asset Risk Assessment
    10.2 Securing OT Systems
    10.3 Securing the Ethernet IP Network Used by OT Systems
    10.3.1 Converter Security
    10.4 Intrusion Detection Systems (IDS)
    Section 11 - IT Systems Management
    11.1 Remote Access
    11.1.1 Protection Measures
    11.2 Vulnerability Scanning (Cyber Audit)
    11.2.1 Performing a Vulnerability Scan
    11.3 Penetration (Pen) Testing
    11.3.1 Carrying out a Pen Test
    11.3.2 Benefits of a Pen Test
    11.4 Endpoint Detection and Response (EDR)
    11.4.1 Extended Detection and Response (XDR)
    11.5 Disaster Recovery from Backup
    11.5.1 Backup Strategy
    11.6 Uninterruptible Power Supply (UPS) for IT/OT Systems

    Checklists
    Checklist 1 - Cyber Security Familiarisation for New Crewmembers
    Checklist 2 - Cyber Security Crew Training
    Checklist 3 - Detecting a Cyber Incident
    Checklist 4 - Responding to a Cyber Incident On Board
    Checklist 5 - Onboard Business Computer
    Checklist 6 - Network Segregation
    Checklist 7 - Networks (Wireless and Wired)
    Checklist 8 - Satellite Communications
    Checklist 9 - OT Systems for Crew
    Checklist 10 - ECDIS Cyber Security
    Checklist 11 - Cyber Security Checks on the Navigation Bridge
    Checklist 12 - Asset Management and Risk Assessment
    Checklist 13 - OT Systems for IT Department
    Checklist 14 - Remote Access