[{"term":"Libraries_BA","id":0,"type":"QUICKLINKS"},{"term":"Instructions","id":1,"type":"QUICKLINKS"},{"term":"WAGO-I/O-PRO","id":2,"type":"QUICKLINKS"},{"term":"Building","id":3,"type":"QUICKLINKS"},{"term":"221","id":4,"type":"QUICKLINKS"}]
{ "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Homepage", "item": "https://www.wago.com/ae" }, { "@type": "ListItem", "position": 2, "name": "Solutions", "item": "https://www.wago.com/ae/solutions" }, { "@type": "ListItem", "position": 3, "name": "Marine and Offshore", "item": "https://www.wago.com/ae/marine-offshore-solutions" }, { "@type": "ListItem", "position": 4, "name": "Cybersecurity on Ships", "item": "https://www.wago.com/ae/marine-offshore-solutions/cybersecurity-on-ships" } ] } [{"url":"/solutions","name":"Solutions","linkClass":null,"categoryCode":null},{"url":"/marine-offshore-solutions","name":"Marine and Offshore","linkClass":null,"categoryCode":null},{"url":"/marine-offshore-solutions/cybersecurity-on-ships","name":"Cybersecurity on Ships","linkClass":"active","categoryCode":null}]
Topics

Cybersecurity on Ships

With increased digitization and networking aboard ships, the risk for data abuse and cybercrime also increases. Anyone considering the possibilities of Maritime 4.0 must also consider the increased requirements for cybersecurity – and more importantly, find suitable solutions for implementing it.

A ship's various intelligent subsystems ensure problem-free operation: from tank and ballast water management through drive control up to alarm and monitoring systems. They all function using industrial automation technology.

Cybersecurity on Ships – This Is How WAGO Helps:

  • As networking in the marine sector increases, so does the exchange of sensitive data.
  • Electronics such as navigation, tracking and collision warning systems require off-ship connections, thus creating a potential target for cybercriminality. With “IT Security by Design,” a layer-based security architecture is integrated into the controllers from the start.
  • WAGO establishes such VPN tunnels using OpenVPN or IPsec directly from the WAGO PFC200 Controller, for example.

Data Security in Focus

At many points, advantages result from networking these subsystems – for example, when ship operations can run with greater resource or energy efficiency. The exchange of sensitive data also increases everywhere systems are networked. And yet this is not enough. In comparison to applications on land, ships have additional electronics like navigation, tracking and collision warning systems. They serve the safety of the ship; however, they also represent an additional threat, primarily because they not only increase the level of onboard networking, but also establish external connections. Internet-based network technologies or mobile services are seeing greater use for these connections. And these communication paths provide access points for manipulation – particularly at the points between the ship and land.

Functional Safety at Risk?

Access to or the reading of sensitive data is a comparatively less important problem when compared with the effects caused by hackers introducing malware into the control systems of ships or drilling rigs, altering coordinates, or accessing a vessel’s security-relevant subsystems. These acts don’t just endanger cybersecurity, they also impede functional safety, and ultimately the crew’s safety. This is precisely why recommendations regarding cybersecurity have increased along with the level of digitization and networking. The American Bureau of Shipping, the Baltic and International Maritime Council, Lloyd’s Register Group, the UK Chamber of Shipping, and the European Union Agency for Network and Information Society have all published guidelines regarding cybersecurity aboard ships. In general, they define processes, model approaches or technical measures for implementing cybersecurity; for the most part, these align with the guidelines for automation technology.

marine_grafik_maritim-4.0_cyber-security_2000x1125.jpg

The reasons for remote access vary greatly between shipping companies and OEMs.