ABSTRACT

Cyberattacks on large information technology infrastructure often make headlines when the identities and personal data of millions of people and organizations are stolen. Similar analogies may be made to shipboard sensor systems where the effects of sensor compromise may often be subtle, long-term and manifest themselves indirectly as a result of breakdowns and similar events. Examples include the ability to make sensors inoperable or blind, spoof GNSS signals on cue to ground a vessel, corrupt electronic navigation charts, hijack ship and vehicle controls, implant descriptions of unauthorized people into smart cameras, disable engine pollution monitors and many other effects. Areas of commonality between information technology (IT) and OT systems and cybersecurity, in general, are described to provide context and to draw attention to topics unique to ship sensor functions and installations. The nature of cyberattacks is also covered providing examples of how the attacks are committed and the potential consequences of these attacks. Also discussed is the muddy grey cyber line that distinguishes where the ship ends and the port begins, especially in current times when constant contact is routinely maintained between ships and shoreside organizations through satellite and terrestrial 5G communication links. Details are provided regarding the critical ship and associated port infrastructure that require protection and the means through which this may be accomplished. The chapter concludes by citing resources describing precautions that may be taken to help minimize the potential for cyberattacks on sensor systems and to limit their severity when they occur.