Bridging the Gap: Enhancing Maritime Vessel Cyber Resilience through Security Operation Centers
Abstract
:1. Introduction
1.1. Maritime Digitalization
1.2. Vessel Connectivity Cyber Risks
2. Background
Maritime SOC Adoption
Maritime Future with Remote Operations Centers (ROCs)
3. Method
4. Results
Cyber Onboarding
“Yes, there are different systems that you can find on board super yachts that you will not find on commercial ships and vice versa. But that is true for any type of vessel. Another thing is that in many cases they are not unified. So, company X could have 20 vessels, but each one could be completely different from the other. So not always there you will see a unified infrastructure or anything like that.”(P4)
“We believe that an attack will first go to other sectors than the maritime sector. This is because, in the maritime sector, every vessel is unique, so it’s more difficult to attack. An attacker would have to tailor-make everything, so I think that is part of the protection as well. It does not mean that we can continue that down that path. But currently, I think the maritime sector is more protected than a lot of other kinds of sectors.”(P8)
“The connectivity depends on how far they operate from a coast. Offshore supply can be either way. They can either have 4G or even be connected to a platform that has a wired connection, but if they’re crossing an ocean, they do not have connectivity.”(P7)
“Because of the current connectivity state of the vessels, we do not have the luxury to monitor our vessels 24/7. However, because this will be the case in the near future, we have started considering how to integrate some cybersecurity solutions with the SOC service to generate reports that will give us a picture of what is happening in our fleet.”(P9)
“I think for us we are very concerned on how much connectivity there is when we are setting up. For example, if they say they only have 256 KB bandwidth, then we have to prioritize which systems are more important. The servers might be more important than the client systems. So, we monitor those areas that we make a prioritization on.”(P8)
“It does not affect the work we do. It does affect the output because more connectivity means more data going through the system, more threats that could be detected, and more false positives that need to be detected and ignored. The main change is the rate of data.”(P4)
“What we see is that we do not want to monitor things that are not connected to the Internet. So, if something is offline, it remains offline. We do not want to monitor it, so instead we just prioritize what you are going to connect to the rest of the world.”(P7)
“So, for IT, I do not think it’s that much of a problem because if the vessel is offline, you cannot hack it. The problem comes with OT because you want to have constant monitoring and when you lose the connection, you do not know what’s going on. You want to have equipment on board the vessel that can monitor it still and then pass the alert when the link is up again.”(P8)
“The loads can be different because usually, super yachts are more connected like bandwidth is used much higher rates over there.”(P4)
“Well, from our point of view, it’s very different because super yachts have a lot of gadgets and new technologies like IPTVs, so they have great connectivity. They have huge bandwidth of vsat and whatever they need.”(P6)
“But right now, we are monitoring a few passenger vessels: medium and long-range ferries, and a lot of offshore support vessels. Their IT onboard is often built up very similarly such as e-mail, end-users, etc.”(P7)
“So basically, yes as regards the connectivity enhancements in the near future, there will be of course more cyber-attacks occurring in vessel digital infrastructure, but I believe there are solutions that can support the cyber security part of the operation of the vessels.”(P3)
“So, the system is context aware. We understood early on that the difference between a ship and an office, shockingly enough, is that it’s moving, but not only that but it has several operations states. So, for example, when the ship is in the port, usually the activity is very high because that is where most work is being done. And when the vessel is sailing the activity is a lot less.”(P4)
“In our system specifically, have several anomaly detection mechanisms on several level layers and context is part of the information fed. So, for example, where is the ship at and other contextual information depending on how we connect.”(P4)
“In many aspects, you need to know what’s going on in the vessel itself. Again, another example is if the ship is in the port, you could see an indication of unwanted activity. But that could be just the consequences of the maintenance because some guy is connecting something.”(P8)
“The context is key to rapidly understand if we have a false positive or a true positive.”(P5)
5. Discussion
Connectivity and Domain Knowledge
Relevance for Future ROC
6. Methodological Discussion and Limitations
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Stellios, I.; Kotzanikolaou, P.; Psarakis, M.; Alcaraz, C.; Lopez, J. A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 2018, 20, 3453–3495. [Google Scholar] [CrossRef]
- Directive (EU) 2022/2555. Pub. L. No. 32022L2555. 2022. Available online: https://eur-lex.europa.eu/eli/dir/2022/2555/oj (accessed on 13 December 2023).
- Yau KL, A.; Syed, A.R.; Hashim, W.; Qadir, J.; Wu, C.; Hassan, N. Maritime Networking: Bringing Internet to the Sea. IEEE Access 2019, 7, 48236–48255. [Google Scholar] [CrossRef]
- Thombre, S.; Zhao, Z.; Ramm-Schmidt, H.; Vallet Garcia, J.M.; Malkamaki, T.; Nikolskiy, S.; Hammarberg, T.; Nuortie, H.; Bhuiyan, M.Z.H.; Särkkä, S.; et al. Sensors and AI Techniques for Situational Awareness in Autonomous Ships: A Review. IEEE Trans. Intell. Transp. Syst. 2022, 23, 64–83. [Google Scholar] [CrossRef]
- Tusher, H.M.; Munim, Z.H.; Notteboom, T.E.; Kim, T.E.; Nazir, S. Cyber security risk assessment in autonomous shipping. Marit. Econ. Logist. 2022, 24, 208–227. [Google Scholar] [CrossRef]
- Raza, Z.; Woxenius, J.; Vural, C.A.; Lind, M. Digital transformation of maritime logistics: Exploring trends in the liner shipping segment. Comput. Ind. 2023, 145, 103811. [Google Scholar] [CrossRef]
- Kranz, M. Using Secure IOT for Efficient Smart Port Operations. 2017. Available online: https://www.porttechnology.org/wp-content/uploads/2019/05/014-016_2017.pdf (accessed on 13 December 2023).
- Scanlan, J.D.; Styles, J.M.; Lyneham, D.; Lutzhoft, M.H. New Internet Satellite Constellations to Increase Cyber Risk in Ill-Prepared Industries. In Proceedings of the 70th International Astronautical Congress (IAC), Washington, DC, USA, 21–25 October 2019; pp. 1–12. [Google Scholar]
- Ashraf, I.; Park, Y.; Hur, S.; Kim, S.W.; Alroobaea, R.; Zikria, Y.B.; Nosheen, S. A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry. IEEE Trans. Intell. Transp. Syst. 2023, 24, 2677–2690. [Google Scholar] [CrossRef]
- DNV. Maritime Cyber Priority 2023: Staying Secure in an Era of Connectivity. 2023. Available online: https://www.dnv.com/cybersecurity/cyber-insights/maritime-cyber-priority-2023.html (accessed on 12 December 2023).
- Das, R.; Gündüz, M. Analysis of cyber-attacks in IoT-based critical infrastructures. Int. J. Inf. Secur. Sci. 2019, 8, 122–133. Available online: https://www.ijiss.org/ijiss/index.php/ijiss/article/view/490/0 (accessed on 12 December 2023).
- Easterly, J. The Attack on Colonial Pipeline: What We’ve Learned & What We’ve Done over the Past Two Years. CISA. Available online: https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years (accessed on 7 May 2023).
- Bhatti, J.; Humphreys, T.E. Hostile Control of Ships via False GPS Signals: Demonstration and Detection. Navigation 2017, 64, 51–66. [Google Scholar] [CrossRef]
- Kessler, G.; Shepard, S. Maritime Cybersecurity—A Guide for Leaders and Managers; Digital Ship Ltd.: London, UK, 2022. [Google Scholar]
- Svilicic, B.; Rudan, I.; Jugović, A.; Zec, D. A Study on Cyber Security Threats in a Shipboard Integrated Navigational System. J. Mar. Sci. Eng. 2019, 7, 364. [Google Scholar] [CrossRef]
- Wired. The Untold Story of NotPetya, the Most Devastating Cyberattack in History. 2018. Available online: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ (accessed on 10 December 2023).
- Svilicic, B.; Rudan, I.; Frančić, V.; Mohović, D. Towards a Cyber Secure Shipboard Radar. J. Navig. 2020, 73, 547–558. [Google Scholar] [CrossRef]
- Tran, K.; Keene, S.; Fretheim, E.; Tsikerdekis, M. Marine Network Protocols and Security Risks. J. Cybersecur. Priv. 2021, 1, 239–251. [Google Scholar] [CrossRef]
- Longo, G.; Russo, E.; Armando, A.; Merlo, A. Attacking (and Defending) the Maritime Radar System. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3575–3589. [Google Scholar] [CrossRef]
- Leite Junior, W.C.; de Moraes, C.C.; de Albuquerque, C.E.P.; Machado, R.C.S.; de Sá, A.O. A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems. Sensors 2021, 21, 3195. [Google Scholar] [CrossRef] [PubMed]
- Grant, A.; Williams, P.; Shaw, G.; De Voy, M.; Ward, N. Understanding GNSS Availability and How it Impacts Maritime Safety. In Proceedings of the International Technical Meeting of the Institute of Navigation, San Diego, CA, USA, 24–26 January 2011; pp. 687–695. Available online: http://www.ion.org/publications/abstract.cfm?jp=p&articleID=9513 (accessed on 12 December 2023).
- Lund, M.S.; Hareide, O.S.; Jøsok, Ø. An Attack on an Integrated Navigation System. Necesse 2018, 3, 149–163. [Google Scholar] [CrossRef]
- Oruc, A. Claims of State-Sponsored Cyberattack in the Maritime Industry. In Proceedings of the 15th International Naval Engineering Conference & Exhibition, Online, 5–9 October 2020. [Google Scholar]
- Androjna, A.; Perkovič, M.; Pavic, I.; Mišković, J. AIS Data Vulnerability Indicated by a Spoofing Case-Study. Appl. Sci. 2021, 11, 5015. [Google Scholar] [CrossRef]
- Lützhöft, M.; Grech, M.R.; Porathe, T. Information Environment, Fatigue, and Culture in the Maritime Domain. Rev. Hum. Factors Ergon. 2011, 7, 280–322. [Google Scholar] [CrossRef]
- IMO. Maritime Cyber Risk Management in Safety Management Systems. IMO. 2017. p. 1. Available online: https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/ResolutionMSC.428(98).pdf (accessed on 12 December 2023).
- Guidelines on Maritime Cyber Risk Management. IMO. 2021. pp. 1–6. Available online: https://wwwcdn.imo.org/localresources/en/OurWork/Facilitation/Facilitation/MSC-FAL.1-Circ.3-Rev.1.pdf (accessed on 12 December 2023).
- BIMCO. The Guidelines on Cyber Security Onboard Ships. 2021. Available online: https://www.bimco.org/about-us-and-our-members/publications/the-guidelines-on-cyber-security-onboard-ships (accessed on 9 December 2023).
- DNV. DNV-RP-0496: Cyber Security Resilience Management for Ships and Mobile Offshore Units in Operation. 2016. Available online: https://www.dnv.com/cybersecurity/recommended-practices/index.html (accessed on 10 December 2023).
- Bureau_Veritas. NR659 Rules on Cyber Security for the Classification of Marine Units. 2023. Available online: https://marine-offshore.bureauveritas.com/nr659-rules-cyber-security-classification-marine-units (accessed on 5 December 2023).
- IACS. UR E26-Cyber Resilience of Ships. 2022. p. 32. Available online: https://iacs.org.uk/resolutions/unified-requirements/ur-e (accessed on 10 December 2023).
- IACS. UR E27 Cyber Resilience of On-board Systems and Equipment. 2022. p. 14. Available online: https://iacs.org.uk/resolutions/unified-requirements/ur-e/ur-e27-rev1 (accessed on 10 December 2023).
- Bhatt, S.; Manadhata, P.K.; Zomlot, L. The operational role of security information and event management systems. IEEE Secur. Priv. 2014, 12, 35–41. [Google Scholar] [CrossRef]
- Jacq, O.; Boudvin, X.; Brosset, D.; Kermarrec, Y.; Simonin, J. Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre. In Proceedings of the 2018 2nd Cyber Security in Networking Conference, CSNet 2018, Paris, France, 24–26 October 2018. [Google Scholar] [CrossRef]
- Heering, D.; Maennel, O.M.; Venables, A.N. Shortcomings in cybersecurity education for seafarers. In Developments in Maritime Technology and Engineering; CRC Press: Boca Raton, FL, USA, 2021; pp. 49–61. [Google Scholar] [CrossRef]
- Hopcraft, R. Developing Maritime Digital Competencies. IEEE Commun. Stand. Mag. 2021, 5, 12–18. [Google Scholar] [CrossRef]
- International Convention on Standards of Training, Certification and Watchkeeping for Seafarers, 1978 (1984). Available online: https://www.imo.org/en/OurWork/HumanElement/Pages/STCW-Convention.aspx (accessed on 13 December 2023).
- Petersen, R.; Santos, D.; Smith, M.C.; Wetzel, K.A.; Witte, G. NIST Special Publication 800-181 Revision 1 Workforce Framework for Cybersecurity (NICE Framework); U.S. Department of Commerce: Washington, DC, USA, 2020. [Google Scholar] [CrossRef]
- Raimondi, M.; Longo, G.; Merlo, A.; Armando, A.; Russo, E. Training the Maritime Security Operations Centre Teams. In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 27–29 July 2022; pp. 388–393. [Google Scholar] [CrossRef]
- de La Vallée, P.; Iosifidis, G.; Rossi, A.; Dri, M.; Mees, W. Sector-Specific Training—A Federated Maritime Scenario. In Multimedia Communications, Services and Security, Proceedings of the 11th International Conference, MCSS 2022, Kraków, Poland, 3–4 November 2022; Communications in Computer and Information Science; Springer: Cham, Switzerland, 2022; Volume 1689, pp. 21–35. [Google Scholar]
- Wartsila. Debunking Maritime Myths of Digital Transformation. 2023. Available online: https://www.wartsila.com/docs/default-source/voyage/myths-of-digital-transformation.pdf?utm_source=web&utm_medium=pdf&utm_term=voyage&utm_content=cta-link (accessed on 10 December 2023).
- Parsons, D. The State of OT/ICS Cybersecurity in 2022 and Beyond. 2022. Available online: https://www.sans.org/white-papers/state-ics-ot-cybersecurity-2022-beyond/ (accessed on 10 December 2023).
- Digital Ship. LEO Connectivity Transforming Maritime Communications. 2023. Available online: https://thedigitalship.com/news/maritime-satellite-communications/item/8510-leo-connectivity-transforming-maritime-communications-says-iec-telecom (accessed on 13 December 2023).
- Sjøfartsdirektoratet. Vessel Types. 2023. Available online: https://www.sdir.no/en/shipping/vessels/vessel-types/ (accessed on 10 December 2023).
- Crowley, C.; Filkins, B.; Pescatore, J. SANS 2023 SOC Survey. 2023. Available online: https://www.sans.org/white-papers/2023-sans-soc-survey/ (accessed on 10 December 2023).
- IMO. Resolution A.915(22)-Revised Maritime Policy and Requirements for a Future Global Navigation Satellite System (Gnss). 2001. Available online: https://wwwcdn.imo.org/localresources/en/KnowledgeCentre/IndexofIMOResolutions/AssemblyDocuments/A.915(22).pdf (accessed on 13 December 2023).
- Munim, Z.H. Autonomous ships: A review, innovative applications and future maritime business models. Supply Chain. Forum Int. J. 2019, 20, 266–279. [Google Scholar] [CrossRef]
- Hanssen, L.; Sofie, L. Identification of Information Requirements in ROC Operations Room. In 53. Institutt for Energiteknikk. 2020. Available online: https://ife.brage.unit.no/ife-xmlui/handle/11250/2727713 (accessed on 10 December 2023).
- Bolbot, V.; Theotokatos, G.; Boulougouris, E.; Vassalos, D. A novel cyber-risk assessment method for ship systems. Saf. Sci. 2020, 131, 104908. [Google Scholar] [CrossRef]
- van de Merwe, K.; Mallam, S.; Nazir, S.; Engelhardtsen, Ø. Supporting human supervision in autonomous collision avoidance through agent transparency. Saf. Sci. 2024, 169, 106329. [Google Scholar] [CrossRef]
- Biondo, A.; Conti, M.; Lain, D. Back to the Epilogue: Evading Control Flow Guard via Unaligned Targets. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, 18–21 February 2018. [Google Scholar] [CrossRef]
- Larsen, H. Cyber Security Alerts in Remote Operation Center [NTNU]. 2022. Available online: https://ntnuopen.ntnu.no/ntnu-xmlui/handle/11250/3050123 (accessed on 13 December 2023).
- Heffner, K.; Rødseth, E.J. Enabling Technologies for Maritime Autonomous Surface Ships. J. Phys. Conf. Ser. 2019, 1357, 012021. [Google Scholar] [CrossRef]
- Kim, T.; Schröder-Hinrichs, J.-U. Research Developments and Debates Regarding Maritime Autonomous Surface Ship: Status, Challenges and Perspectives. In New Maritime Business. WMU Studies in Maritime Affairs; Springer: Cham, Switzerland, 2021; pp. 175–197. [Google Scholar] [CrossRef]
- Chang, C.H.; Kontovas, C.; Yu, Q.; Yang, Z. Risk assessment of the operations of maritime autonomous surface ships. Reliab. Eng. Syst. Saf. 2021, 207, 107324. [Google Scholar] [CrossRef]
- Namgung, H. Spectrum Requirements for Control and Non-payload Communication of Maritime Autonomous Surface Ship. Adv. Sci. Technol. Eng. Syst. 2019, 4, 294–299. [Google Scholar] [CrossRef]
- Chen, S.; Xiong, X.; Wen, Y.; Jian, J.; Huang, Y. State Compensation for Maritime Autonomous Surface Ships’ Remote Control. J. Mar. Sci. Eng. 2023, 11, 450. [Google Scholar] [CrossRef]
- Longo, G.; Orlich, A.; Merlo, A.; Russo, E. Enabling Real-Time Remote Monitoring of Ships by Lossless Protocol Transformations. IEEE Trans. Intell. Transp. Syst. 2023, 24, 7285–7295. [Google Scholar] [CrossRef]
- Bolbot, V.; Theotokatos, G.; Boulougouris, E.; Vassalos, D. Safety related cyber-attacks identification and assessment for autonomous inland ships. In Proceedings of the International Seminar on Safety and Security of Autonomous Vessels, Helsinki, Finland, 17–18 September 2019; Volume 17. Available online: https://www.researchgate.net/publication/335977458 (accessed on 13 December 2023).
- Höyhtyä, M.; Martio, J. Integrated Satellite–Terrestrial Connectivity for Autonomous Ships: Survey and Future Research Directions. Remote Sens. 2020, 12, 2507. [Google Scholar] [CrossRef]
- Rødseth, Ø.J.; Lien Wennersberg, L.A.; Nordahl, H. Towards approval of autonomous ship systems by their operational envelope. J. Mar. Sci. Technol. 2022, 27, 67–76. [Google Scholar] [CrossRef]
- Fjørtoft, K.E.; Holte, E.A. Implementing operational envelopes for improved resilience of autonomous maritime transport. Adv. Transp. AHFE 2022, 60, 698–706. [Google Scholar] [CrossRef]
- Fjørtoft, K.E.; Rødseth, J. Using the Operational Envelope to Make Autonomous Ships Safer. In Proceedings of the 30th European Safety and Reliability Conference and the 15th Probabilistic Safety Assessment and Management Conference, Venice, Italy, 1–5 November 2020; pp. 76–83. [Google Scholar] [CrossRef]
- Creswell, J.W. Qualitative Inquiry & Research Design, 4th ed.; Sage Publications, Inc.: London, UK, 2018; pp. 1–646. [Google Scholar]
- Microsoft. Microsoft Teams (1.6). 2023. Available online: https://www.microsoft.com/en-us/microsoft-teams/group-chat-software (accessed on 13 December 2023).
- Zoom. Zoom Video Communications. 2023. Available online: https://zoom.us/ (accessed on 13 December 2023).
- Microsoft. Microsoft Word 365 (2023). 2023. Available online: https://www.microsoft.com/en-us/microsoft-365/free-office-online-for-the-web (accessed on 13 December 2023).
- Microsoft. Microsoft Excel 365. 2023. Available online: https://www.microsoft.com/en-us/microsoft-365/excel (accessed on 10 December 2023).
- Charmaz, K. Constructing Grounded Theory; Sage Publishing: London, UK, 2014; 416p. [Google Scholar]
- Hennink, M.M.; Kaiser, B.N.; Marconi, V.C. Code Saturation Versus Meaning Saturation: How Many Interviews Are Enough? Qual. Health Res. 2017, 27, 591–608. [Google Scholar] [CrossRef]
- Devo. 2022 Devo SOC Performance Report. 2022. Available online: https://www.devo.com/resources/analyst-research/2022-devo-soc-performance-report/ (accessed on 10 December 2023).
- Kim, A.; Kang, M.H.; Luo, J.Z.; Velasquez, A. A Framework for Event Prioritization in Cyber Network Defense. 2014. Available online: https://apps.dtic.mil/sti/citations/ADA608707 (accessed on 13 December 2023).
- Knerler, K.; Parker, I.; Zimmerman, C. 11 Strategies of a World-Class Cybersecurity Operations Center. 2022. Available online: https://www.mitre.org/sites/default/files/2022-04/11-strategies-of-a-world-class-cybersecurity-operations-center.pdf (accessed on 13 December 2023).
- Alahmadi, B.; Axon, L.; Martinovic, I. 99% False Positives: A Qualitative Study of SOC Analysts’ Perspectives on Security Alarms. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 2783–2800. Available online: https://www.usenix.org/conference/usenixsecurity22/presentation/alahmadi (accessed on 13 December 2023).
- Roy, J. Anomaly detection in the maritime domain. In Proceedings of the SPIE 6945, Optics and Photonics in Global Homeland Security IV, Orlando, FL, USA, 16–20 March 2008; Volume 6945, pp. 180–193. [Google Scholar] [CrossRef]
- Van Laere, J.; Nilsson, M. Evaluation of a workshop to capture knowledge from subject matter experts in maritime surveillance. In Proceedings of the 12th International Conference on Information Fusion, Seattle, WA, USA, 6–9 July 2009; pp. 171–178. Available online: https://ieeexplore.ieee.org/document/5203817/ (accessed on 13 December 2023).
- Agyepong, E.; Cherdantseva, Y.; Reinecke, P.; Burnap, P. Towards a Framework for Measuring the Performance of a Security Operations Center Analyst. In Proceedings of the International Conference on Cyber Security and Protection of Digital Services, Cyber Security, Dublin, Ireland, 15–19 June 2020. [Google Scholar] [CrossRef]
- Basyurt, A.; Fromm, J.; Kuehn, P.; Kaufhold, M.-A.; Mirbabaie, M. Help Wanted—Challenges in Data Collection, Analysis and Communication of Cyber Threats in Security Operation Centers. Wirtschaftsinformatik 2022 Proceedings. 2022. Available online: https://aisel.aisnet.org/wi2022/it_for_development/it_for_development/20 (accessed on 10 December 2023).
- Hámornik, B.P.; Krasznay, C. A team-level perspective of human factors in cyber security: Security operations centers. Adv. Intell. Syst. Comput. 2018, 593, 224–236. [Google Scholar]
- Reisser, A.; Vielberth, M.; Fohringer, S.; Pernul, G. Security Operations Center Roles and Skills: A Comparison of Theory and Practice. In Data and Applications Security and Privacy XXXVI, Proceedings of the 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, 18–20 July 2022; Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2022; Volume 13383, pp. 316–327. [Google Scholar]
- Cho, S.Y.; Happa, J.; Creese, S. Capturing Tacit Knowledge in Security Operation Centers. IEEE Access 2020, 8, 42021–42041. [Google Scholar] [CrossRef]
Organization | Operating Model | Staff Count | Fleet Size | Fleet Type | Interview Participants |
---|---|---|---|---|---|
M-SOC 1 | MSSP | 10 | 500 | Tankers, Floating Production Storage and Offloading (FPSO) | P1, P2, P3 |
M-SOC 2 | MSSP | 15 | 200 | Superyachts, cruise ships, container vessels | P4 |
M-SOC 3 | MSSP | 10 | 300 | Superyachts, passenger, and container vessels | P5, P6 |
M-SOC 4 | MSSP | 9 | 150 | Container and passenger vessels | P7, P8 |
M-SOC 5 | In-house | 4 | 60 | Tankers | P9 |
Category | Description |
---|---|
Incident Analysis | Process of investigating the root cause of the alert. |
Subcategory | Description |
Personnel Shortages | Relates to the impact of M-SOC staff shortages on the incident analysis process. |
Incident Prioritization | How M-SOC analysts rank the criticality of incoming alerts. |
Intelligence Gathering | The process of obtaining additional information related to the alert that would assist with its analysis. |
Information Sharing | The ease with which cyber threat information is disseminated within the maritime domain which would assist in timely incident analysis. |
Category | Description |
---|---|
Operational Domain | The industry within which the M-SOC operates, maritime in our case. |
Subcategory | Description |
Cyber Maturity | Maritime stakeholders’ investment in cyber security preparedness, recovery, and business continuity |
Cyber Awareness | Cyber awareness levels of crew onboard the vessel and shoreside personnel. |
Regulation | Existing maritime cybersecurity regulation. |
Digitalization | The level of technological adoption in the maritime domain. |
Category | Description |
---|---|
Cyber Onboarding | Ensures client monitoring requirements are fully captured and incorporated into the M-SOC monitoring platform. |
Subcategory | Description |
Connectivity | The degree to which the vessel has sufficient internet access and bandwidth to facilitate real-time monitoring. |
Domain Knowledge | Contextual knowledge regarding vessel operations such as key onboard systems and sailing routes. |
Category | Description |
---|---|
Incident Communication | The procedures involved in alerting the crew onboard the vessel on the cyber threat alert. |
Subcategory | Description |
Message Framing | How the threat information is communicated to elicit a response from the recipients (crew). |
Channel | The medium used by the M-SOC to convey the cyber threat alert to the crew onboard the vessel. |
Communication Feedback | The learning phase for the M-SOC where the crew and M-SOC work on improving the incident communication process. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nganga, A.; Nganya, G.; Lützhöft, M.; Mallam, S.; Scanlan, J. Bridging the Gap: Enhancing Maritime Vessel Cyber Resilience through Security Operation Centers. Sensors 2024, 24, 146. https://doi.org/10.3390/s24010146
Nganga A, Nganya G, Lützhöft M, Mallam S, Scanlan J. Bridging the Gap: Enhancing Maritime Vessel Cyber Resilience through Security Operation Centers. Sensors. 2024; 24(1):146. https://doi.org/10.3390/s24010146
Chicago/Turabian StyleNganga, Allan, George Nganya, Margareta Lützhöft, Steven Mallam, and Joel Scanlan. 2024. "Bridging the Gap: Enhancing Maritime Vessel Cyber Resilience through Security Operation Centers" Sensors 24, no. 1: 146. https://doi.org/10.3390/s24010146
APA StyleNganga, A., Nganya, G., Lützhöft, M., Mallam, S., & Scanlan, J. (2024). Bridging the Gap: Enhancing Maritime Vessel Cyber Resilience through Security Operation Centers. Sensors, 24(1), 146. https://doi.org/10.3390/s24010146