ISPS Ship Shore Exercise Cyber Security
ISPS Ship Shore Exercise Cyber Security
ISPS Ship Shore Exercise Cyber Security
SCENARIO
Ship in port loading Cargo, C/O’s personal mobile phone left in Office room
next to CCR. Shore personal who boarded with Loading Master for collecting
cargo sample accessed C/O’s mobile phone and noted down the user ID and
password of Office computer. Later shore personal accessed to the Office
computer with C/O’s user ID and password, insert a thumb drive to the PC.
Later C/O discovered Office computer crashed and noted thumb drive access
point breached (unlocked). He informed Master.
Master checked other computers as ship’s office computer is connected to
PC’s located on bridge, CCR and ECR, these PC’s (including PC for email)
also corrupted.
Master announced and sounded signal for Mustering for Emergency Exercise
keeping Gangway access control and security measures in level 2.
Master called CSO and inform Ship’s all Computers and e-mail
communication system crashed and possible Illegal access of ship’s computer
system. NOVACO (Notices to Mariner) and Electronic Chart correction
receiving system not available.
ACTIONS TO BE TAKEN
Page 1 of 3
5. All access control to Critical information to be suspended by all on board
users
6. Conduct an Extraordinary Security Meeting with All Crew (Explain Cyber
Security Objective and Policy OT-TK-12.1).
7.Investigate if any Shipboard user used/ attached unauthorized devise for
any purpose?
8.Visitor log to be seized and check the details of the person boarded with
Loading master and others.
9. As email system collapsed therefore Master to setup alternate
communication method. e.g IMARSAT C.
10. Master to arrange with local agent to get Notices to Mariners for
passage Plan for the intended voyage.
11. Company to identify the nature of cyber security incident
12. Master to follow the IT Dept advice to try to restore and access to the
applications and Databases needs immediate attention.
13. Office to demonstrate activating various concerned party in accordance
Cyber security service provide.
14. Keep record details and on board timing
15. Conduct a debriefing of the exercise with captain
16. Record the exercise in SSP appendix 14.3
1. GENERAL
2. OBJECTIVES:
2.1 To comply with ISPS code Part A 3.5, part B 13.7, company
regulation OT-SSP-14/3 and SOP.
2.2 Cyber Security is the preventative techniques used to protect the
integrity of networks, programs and data from attack, damage, or
unauthorised access.
3. ABORTION OF EXERCISE:
3.1 Ocean tankers OSC will issue:
“THIS IS ISPS EXERCISE OCEAN TANKERS ABORT,
REPEAT EXERCISE OCEAN TANKERS ABORT”
Page 2 of 3
4. TERMINATION OF EXERCISE
5. DEBRIEFING:
This meeting will be held at the vessel meeting room. All major
participants are requested to attend. Participants who cannot attend is
requested his comments on the exercise by another person.
Minimum points to discuss in debriefing;
1. Strength; what are the things went well, any Best Practice?
2. Weakness; what are the things went wrong.
3. Recommendation of improvement.
Page 3 of 3