16.11.2022 Views

MASS UK Industry Conduct Principles and Code of Practice 2022 (V6)

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

n Mini Trials Plans<br />

n Complex Trials Plans<br />

n Loadline Exemptions<br />

n Shipping Register Status (SSR)<br />

n Risk Assessments for the Operation that the vessel is about to undertake<br />

n St<strong>and</strong>ard Operating Procedures (SOP)<br />

n Vessel Log Books<br />

n User Manuals<br />

n OfCom License<br />

n Load Test Certification <strong>of</strong> lifting arrangements<br />

4.8.2 On initial engagement with a trial or operation authorisation agency, agree up front on the documentation required<br />

for the trial/demonstration or operation <strong>and</strong> build this into the delivery schedule to produce.<br />

5 Cyber Security Considerations for <strong>MASS</strong><br />

(Autonomous <strong>and</strong> Remotely Controlled)<br />

5.1 OBJECTIVE<br />

The objective <strong>of</strong> this Chapter is to provide guidance on the requirements for Cyber Safety <strong>and</strong><br />

Security for <strong>MASS</strong> operations.<br />

5.2 SCOPE<br />

5.2.1 The objectives <strong>of</strong> this <strong>Code</strong> are to ensure that all aspects <strong>of</strong> Cyber Safety <strong>and</strong> Security are addressed for all<br />

<strong>MASS</strong> operations.<br />

5.3 GENERAL<br />

5.3.1 We are currently living in what is commonly referred to as the 4th Industrial revolution, the digital age. Over the<br />

past 50 years technology has advanced <strong>and</strong> evolved in ways unimaginable in the 1970’s. A business computer<br />

system would have required a whole floor, in a large building, to house its data storage system. Now a mobile<br />

phone can hold more data, access it faster <strong>and</strong> communicate it to, virtually, anywhere on the planet with a suitable<br />

communication network.<br />

Remote Control Centre used for training<br />

5.3.2 Advances in material technology <strong>and</strong> miniaturisation techniques have allowed the creation <strong>of</strong> computer memory<br />

chips with capacities measured in Peta bytes (PB = 1×10^15) <strong>and</strong> Exa bytes (EB = 1×10^18). New technology<br />

has allowed the development <strong>of</strong> processor chips which can perform billions <strong>of</strong> operations per second (GHz). This<br />

has resulted in small, very fast, large memory capacity devices which are capable <strong>of</strong> dealing with large amounts<br />

<strong>of</strong> data very rapidly. Modern hardware <strong>and</strong> advanced s<strong>of</strong>tware combined with advanced communications<br />

technology, allow businesses <strong>and</strong> people to communicate <strong>and</strong> share information anywhere on the planet. Cloud<br />

computing has allowed us to remotely store, access <strong>and</strong> share massive amounts <strong>of</strong> data on dem<strong>and</strong>. There is no<br />

area <strong>of</strong> our working or private lives that has not been impacted by these technologies. In addition to being able<br />

to use these systems for complicated local tasks, we can communicate instantly with friends <strong>and</strong> family,<br />

collaborate with business colleagues, carry out online banking, shopping, education, video conferences, stream<br />

music <strong>and</strong> video <strong>and</strong>, more recently, perform remote audits, inspections, competence assessments <strong>and</strong> monitor<br />

performance. Dedicated machines are used to control <strong>and</strong> monitor industrial processes automatically <strong>and</strong><br />

generate alarms if the system detects anomalies which require human intervention.<br />

5.3.3 This technology, collectively known as Information Technology (IT), uses computer systems to process data or<br />

information. Combined with a communication system <strong>and</strong> associated peripheral equipment, such as sensors,<br />

specific data can be mined, processed, manipulated <strong>and</strong> analysed to provide monitoring <strong>and</strong> control <strong>of</strong> any<br />

system.<br />

5.3.4 Artificial intelligence (AI) <strong>and</strong> machine learning (ML) are processes by which an IT system monitors large amounts<br />

<strong>of</strong> data <strong>and</strong> identifies trends <strong>and</strong> anomalies <strong>and</strong> can improve processes <strong>and</strong> performance, such as digital twin<br />

<strong>and</strong> predictive maintenance (PM).<br />

36<br />

<strong>MASS</strong> <strong>UK</strong> <strong>Industry</strong> <strong>Conduct</strong> <strong>Principles</strong> <strong>and</strong> <strong>Code</strong> <strong>of</strong> <strong>Practice</strong> Version 6<br />

<strong>MASS</strong> <strong>UK</strong> <strong>Industry</strong> <strong>Conduct</strong> <strong>Principles</strong> <strong>and</strong> <strong>Code</strong> <strong>of</strong> <strong>Practice</strong> Version 6 37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!