27.12.2012 Views

Fishing Vessel Monitoring Systems: Past, Present and Future

Fishing Vessel Monitoring Systems: Past, Present and Future

Fishing Vessel Monitoring Systems: Past, Present and Future

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

VMS: <strong>Past</strong>, <strong>Present</strong> <strong>and</strong> <strong>Future</strong> 33<br />

When such a requirement is combined with security connectors at both the<br />

terminal <strong>and</strong> the antenna, it is an effective means of preventing one of the most<br />

primary means of VMS data tampering: removal of the VMS terminal from the<br />

vessel to be tracked.<br />

The issue of security as related to VMS is, of course, a complex one with at least<br />

two, distinct aspects: the reliability of the data gathered <strong>and</strong> keeping that data,<br />

once it is gathered, totally secure against unauthorised access <strong>and</strong> use. The first<br />

of these, basically an issue of system <strong>and</strong> data tampering, is amply covered in<br />

this study’s chapter on vessel equipment security.<br />

5.3 Data access <strong>and</strong> distribution<br />

Security of access <strong>and</strong> use is a quite different question. It is based upon the fact<br />

that VMS data is inherently confidential in that data related to the exact positions<br />

where a fishing vessel operates benefits from the concept of commercial<br />

confidentiality. There is even an on-going debate as to whom VMS data belongs,<br />

the vessel operator or the agency operating the VMS. In either case the vessel<br />

operator has a right to expect that VMS data be treated with the care <strong>and</strong> respect<br />

that it deserves.<br />

The difficulty of maintaining confidentiality of VMS data is closely related to the<br />

use to which it is put. Data that remains in, for example, a FMC that operates in<br />

st<strong>and</strong>-alone mode, poses far fewer security questions than one that is networked,<br />

providing data to users distributed in different places. Being able to assure this<br />

security is key, as the successful continued operation of a VMS requires at the<br />

very least the tacit cooperation of the fishing industry.<br />

5.3.1 Two aspects of data security<br />

Once again, there are two aspects to this part of the VMS security issue, the<br />

pure, technical aspect <strong>and</strong> the question of misuse of data by authorised users.<br />

The first aspect is a pure information technology issue, <strong>and</strong> has to do with<br />

matters like user identification (passwords, readable ID cards, etc.), firewalls to<br />

prevent unauthorised external access, <strong>and</strong> restricted physical access to system<br />

hardware.<br />

There is no stock solution to this data processing <strong>and</strong> telecommunications issue<br />

as the adequate arrangement is directly related to the results of a security risk<br />

analysis that should accompany the implementation of any VMS. This<br />

examination should cover everything from the value of the data gathered (i.e.<br />

how much would an unscrupulous vessel operator be prepared to pay for the<br />

position data of a successful vessel) to a security assessment of existing data

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!