Seletar Spirit - CyberSecurity JHA
Seletar Spirit - CyberSecurity JHA
Version: 23
Forms
Supervisor: Master
Step Descriptio Identify the following: Measures that are required to be put Residual Residual Residua Measures
No. n of task i. Hazards in place to prevent and/or minimize Consequenc Likelihoo l are in
step the severity of the injury or damage. e d Risk place.
ii. Who or what may be injured,
Consequences X Likelihood = (Signature
damaged or result in a loss
Risk )
iii. How would this happen.
1. Syetem i. Obsolete and unsupported operating Keep the operating system and software 4 1 4
updates systems/ software updated to the latest version/ patch released by
the developer.
ii. Ships server, computers
iii. Ransomware, malware, virus attack
4. Network i. Lack boundary protection measures and Network to be set up with adequate barriers/ 4 1 4
Updates segmentation of networks protections.
5. Antivirus i. Outdated or missing antivirus software and Antivirus software to be kept updated at all times 4 1 4
Updates protection from malware
ii. Ships server, computers
iii. Corruption of data due to virus/ malware
6. Use of i. Personal laptops, tablets, USB memory Scan Personal laptops, tablets, USB memory 4 1 4
Removable sticks of external parties (surveyors, sticks for viruses and malware before
Media devices connecting to on-board computers - Information
onboard technicians etc.) connected to on-board technology/ operational technology (IT/ OT).
computers.
ii. Ships server, computers
i. Infecting ship's network by forreign USB Shore personnel must be allowed to use only 4 2 8
drives standalone computers for reading/printing files
ii. Ship's computers,server on board
i. Infecting ship's network by forreign USB Officer on watch in CCR or on Bridge instruced
drives always to scan external USB drives before 4 1 4
ii. Ship's computers,server opening.
iii. Not scanning external flash drive with any
virus program before use. Even on stanalone
stations
7. Receving i. Phishing through emails containing Receiving emails only from the whitelisted email 4 1 4
Phishing mails hyperlinks to fake websites. Infected SPAM ids. Open emails or open attachments from
and or SPAM will automatically deleted by the firewall. senders that you know and trust. Crew email
computers should not be connected to any
ii. Ships server, computers safety critical system on board.
iii. Corruption of vulnerable data from ship's All crew to be briefed not to click on links and
computers attachments from unknown sources. Welcome
Onboard familiarization to be completed,
including Cyber security awareness.
External WI_Fi never to be used for company
emails or downloads unless protected by VPN
8. ECDIS Update i. Use of unscanned USB for data transfer on USB dedicated for use with ECDIS should be 4 1 4
by USB. ECDIS maintained on board.
i. Unauthorized access to ECDIS USB ports USB locks received and installed. Lock key in 4 1 4
possesion of Master and Nav.Officer only
ii. ECDIS and Server
iii. Meanss for locking USB ports not available
9 Crew training i. Lack of knowledge or misunderstanding of Cyber security video and presentation shown to 4 1 4
the concept of Cyber security all crew. Discussion carried out and crew
ii. Ship's computers confirmed understanding on all asspects as per
SP2266
iii.Insufficient traiing
Name Signature
Note: The degree of risk is based on an evaluation of severity and likelihood. For guidance on how to calculate the degree of risk, refer to Health, Safety, and
Environmental Hazard databases, Risk Matrix and the Risk Assessment & Job Hazard Analysis.
**Person in Charge’s signature indicates that the hazards, risks and control measures associated with the task have been reviewed with all persons involved
in performing the task.
**The Consequences and Likelihood columns are for the RESIDUAL consequence and likelihood AFTER counter measures have been put in place.