rss icon Subscribe
desktop mobile

Maritime Cybersecurity: A New Approach is Needed

© stepheng101 / Adobe Stock

By Rick Scott

It is time to move toward a quantitative approach that provides deeper understanding of individual risk elements observed in marine operating systems.

Increasing connectivity in complex maritime operating systems is escalating the potential impact of cyber-related incidents and complicating the task of defending against them. Traditional methods for assessing cyber risk provide inadequate guidance for applying limited security resources.

Currently, available risk assessment methods are largely qualitative. Even so, these methods do provide the current foundation for risk management plans, on which owners and operators base programs to identify, protect, detect and recover from cybersecurity breaches. Building on that model, it is time to move toward a quantitative approach that provides deeper understanding of individual risk elements observed in marine operating systems, and provides owners with engineering "knobs to turn" to reduce them.

The most common equation used to represent cyber risk is: Risk = Threat x Vulnerability x Consequence. This equation has proven useful for practitioners insofar as it has helped analysts intuitively understand that risk has three constituent elements, and infers that by removing one of these elements, risk can be reduced. But this formula is less an equation, in a mathematical sense, than a reference model for understanding the nature of cybersecurity risk. Its three elements largely are difficult to measure and are problematic when trying to engineer and/or calculate a cybersecurity solution. For the modern maritime risk practitioner, the core challenge is to create a model that defines cyber risk so it can be counted, measured, computed and modeled for maritime operating systems.

ABS recently collaborated with Stevens Institute to research this problem for the maritime sector and redefine the equation in terms that are countable, observable and easily understood. One of the things our research with the Stevens Institute discovered was that the nature of maritime risk within cybersecurity is not well defined or understood. Nor is it particularly well managed.

The result is a new model that helps owners proactively gain control over cybersecurity risks.

These risks in turn drive specific requirements, engineering decisions and resource commitments. The model focuses on identifying solutions that are computationally engineered, highly detailed and in context with the risks to be managed.

Effectively, it places the controls for responding to cyber risks back into the hands of the asset owner.

Shifting industry cyber risk practices away from more traditional defensive methods to a measurable process will require the industry to change the conversation, but most importantly it also will require a change in how risk practitioners think about risk.

To represent 'Consequence, Vulnerability, and Threat' as calculable elements of a risk equation for operating technology, we replaced them with the concepts of 'Functions, Connections, and Identities' (FCI), respectively.

'Functions' allow the crew to maneuver the vessel or perform its mission, which can be anything from drilling oil, to carrying people and cargo, or combinations of each. In the FCI risk equation, they represent systems that a cyber attacker would seek to control or defeat: steering, location monitors, propulsion systems, communications, anything to serve their purpose.

'Connections' represent, in relation to maritime operating technology, how the functions communicate with one another, to shore, to satellites, to the Internet, etc.

Within each connection is a 'node', the point through which a cyber incursion gains access.

'Identities' are either a human, or a digital device. Replacing Threat with Identity allows threats to be counted, a breakthrough concept for advancing maritime risk calculation.

In the context of the FCI model, a threat has to have an agenda. These can range from lack of awareness of cyber risks to unintentional behaviors - "I'm not going to adhere to company rules and perform my duties in a secure way" - or actions such as the hijacking of navigational systems to steal or destroy a vessel, or other acts disruptive to normal operations, typically for monetary gain.

The quantitative data from the Functions, Connections and Identities are then counted and used to populate a worksheet that builds a Risk Index to demonstrate how specific FCI alterations would change the relative risk of each system's configuration.

The process described here is simplified, but the Risk Index ultimately provides a quantitative view of the relative risk associated with the architectural design of individual systems onboard the vessel. That is something that has been missing in the maritime cybersecurity space.

The FCI method determines whether Connection nodes (the access points) are adequately protected, and whether or not the asset owner has controlled the Identities of those who have been provided access to nodes and restricted areas within the vessel control system architecture.

The Index illustrates each component's contribution to the overall risk. Based on those individual risk contributions, for example, the owner can redesign a network architecture to re-engineer how the system is being accessed, either through human-machine interfaces, cell phones, thumb drives, or connections to the Internet.

This new approach allows the owner to take a fleet-wide view to determining the relative risk associated with each vessel based on the way its digital system is designed, the way people are allowed to access it, and the way the nodes, or access points, are protected.

ABS delivers a risk index calculated through the FCI approach, which is a number that represents the relative level of risk inherent in the design and operation of the digital system on the ship. It helps owners to decide where to deploy their often-limited cyber-defense resources.

There is an old adage in industry: you can't manage what you don't measure. As the maritime industry continues its march towards auto¬mation, companies that can measure and manage cyber risk will be better positioned to tackle challenges in the new digital era.

As an industry, the ability to measure cyber risk will become a core foundation for operational efficiency and safety.


(As published in the April 2018 edition of Maritime Reporter & Engineering News)

May 8, 2018

 

Technology

Hapag-Lloyd Launches Optimised Mobile App

Image: Hapag-Lloyd

Beginning immediately, all Hapag-Lloyd customers can make use of the advantages offered by the

The Ocean Cleanup Kicks Off

(Photo: The Ocean Cleanup)

A first-of-its-kind floating ocean cleanup system is undergoing a final round of testing before it

DNV GL: New Guidelines for Autonomous Ships

(Image: DNV GL)

With the first commercial autonomous and remotely operated vessels due to launch in the next

Maritime Security

New Hybrid Electric Patrol Boat for Estonia

(Photo: Danfoss)

A new multipurpose 45-meter patrol ship will be used by the Estonian Police and Border Guard

Port of San Juan: A Case Study in Port Security Innovation

Photo: S2 Global

Thirty-six hours after Hurricane Maria hit Puerto Rico, the port of San Juan was back up and

Incat Crowther Design for S. African Special Forces

Image: Incat Crowther

Incat Crowther signed a design contract with Cape Town based shipbuilder Veecraft Marine for the

Maritime Apps