Research Article

Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard

Volume: 10 Number: Özel Sayı: 1 October 3, 2024
EN TR

Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard

Abstract

The efficient operation of ship systems that control navigation, communications, sensors, and power and machinery is dependent on the increasing digitization of the maritime sector and the intense use of information and operational technologies. The goal of issuing and enforcing global regulations and standards is to lessen the impact of potential dangers that could jeopardize on-board systems, network and data integrity, and operation, functionality and safety. At this point, "Cyber Resilience of Ships" (UR E26) is recently released by the International Association of Classification Societies (IACS) to address the need to improve ships' cyber resilience. This regulation will be applicable to new ships built on and after 1 July 2024. This study aims to create a check list for ship cyber security based on IACS UR E26 standard. A ship cyber security checklist was developed by first analyzing ship operational technologies, identifying potential cyber risks and vulnerabilities, and then creating a checklist in accordance with the IACS UR E26 standard to ensure cyber security on board. With a focus on clean seas and safe ships, the IACS provides technical assistance, verifies compliance, and conducts research and development to enhance maritime safety, security and regulation. This study provides practical tool to ships for ship cyber security management under the safety management system besides IACS standard benefits. Creating a checklist in accordance with the IACS UR E26 standard also allows ship owners and operators to comply with the standards and facilitate inspection processes. This reduces the effort spent to comply with international regulations. It helps to proactively manage cyber risks by providing a systematic approach to ship cyber security management.

Keywords

Supporting Institution

İstanbul Technical University

Project Number

45514

References

  1. Ashraf, I., Park, Y., Hur, S., Kim, S. W., Alroobaea, R., Zikria, Y. Bin, Nosheen, S. (2022). A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry. IEEE Transactions on Intelligent Transportation Systems, 1–14. doi:10.1109/TITS.2022.3164678.
  2. Bolbot, V., Kulkarni, K., Brunou, P., Banda, O.V., Musharraf, M. (2022). Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis. International Journal of Critical Infrastructure Protection, 39: 100571. doi: 10.1016/j.ijcip.2022.100571
  3. DNV-GL, (2016). Cyber security resilience management for ships and mobile offshore units in operation.
  4. DNV-GL Corporate Report, DNVGL-RP-0 (September), 1–86.
  5. DNV-GL, Cyber Secure Class Notation, (2022). Accessed Date: 03/07/2024, https://www.dnv.com/services/cyber-secure-class-notation-124600/ is retrieved.
  6. Hyra, B. (2019). Analyzing the Attack Surface of Ships. DTU Compute Department of Applied Mathematics and Computer Science Technical University of Denmark. Accessed Date: 08/07/2024, https://backend.orbit.dtu.dk/ws/portalfiles/portal/218483747/190401_Analyzing_the_Attack_Surface_of_Ships.pdf is retrieved.
  7. IACS, IACS UR E26 and E27 Press Release, (2024). Accessed Date: 05/08/2024, https://iacs.org.uk/news/iacs-ur-e26-and-e27-press-release is retrieved.
  8. IACS UR E22, Computer-based Systems, (2023). Accessed Date: 05/08/2024 https://iacs.s3.af-south-1.amazonaws.com/wp-content/uploads/2023/08/10161629/ur-e22rev3.pdf is retrieved.

Details

Primary Language

English

Subjects

Maritime Transportation Engineering

Journal Section

Research Article

Early Pub Date

September 23, 2024

Publication Date

October 3, 2024

Submission Date

August 10, 2024

Acceptance Date

September 8, 2024

Published in Issue

Year 2024 Volume: 10 Number: Özel Sayı: 1

APA
Kayisoglu, G., Duzenli, E., Bolat, P., & Bolat, F. (2024). Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard. Turkish Journal of Maritime and Marine Sciences, 10(Özel Sayı: 1), 31-50. https://doi.org/10.52998/trjmms.1531150
AMA
1.Kayisoglu G, Duzenli E, Bolat P, Bolat F. Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard. TRJMMS. 2024;10(Özel Sayı: 1):31-50. doi:10.52998/trjmms.1531150
Chicago
Kayisoglu, Gizem, Emre Duzenli, Pelin Bolat, and Firat Bolat. 2024. “Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard”. Turkish Journal of Maritime and Marine Sciences 10 (Özel Sayı: 1): 31-50. https://doi.org/10.52998/trjmms.1531150.
EndNote
Kayisoglu G, Duzenli E, Bolat P, Bolat F (October 1, 2024) Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard. Turkish Journal of Maritime and Marine Sciences 10 Özel Sayı: 1 31–50.
IEEE
[1]G. Kayisoglu, E. Duzenli, P. Bolat, and F. Bolat, “Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard”, TRJMMS, vol. 10, no. Özel Sayı: 1, pp. 31–50, Oct. 2024, doi: 10.52998/trjmms.1531150.
ISNAD
Kayisoglu, Gizem - Duzenli, Emre - Bolat, Pelin - Bolat, Firat. “Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard”. Turkish Journal of Maritime and Marine Sciences 10/Özel Sayı: 1 (October 1, 2024): 31-50. https://doi.org/10.52998/trjmms.1531150.
JAMA
1.Kayisoglu G, Duzenli E, Bolat P, Bolat F. Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard. TRJMMS. 2024;10:31–50.
MLA
Kayisoglu, Gizem, et al. “Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard”. Turkish Journal of Maritime and Marine Sciences, vol. 10, no. Özel Sayı: 1, Oct. 2024, pp. 31-50, doi:10.52998/trjmms.1531150.
Vancouver
1.Gizem Kayisoglu, Emre Duzenli, Pelin Bolat, Firat Bolat. Maritime Cyber Security: Adopting a Checklist Based on IACS UR E26 Standard. TRJMMS. 2024 Oct. 1;10(Özel Sayı: 1):31-50. doi:10.52998/trjmms.1531150

Creative Commons Lisansı

This Journal is licensed with Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Licence (CC BY-NC-ND 4.0).