24.11.2023 Views

COP_2023_V7_pages

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

13.6.5 Security measures include:<br />

n Security by design, using best practice principles;<br />

n Use of safe operating system (or no operating system at all), as many cyber-attacks exploit the operating system<br />

itself;<br />

n Air-gapping (denial of communications so that the firmware, once programmed, is safe). This eliminates backdoor<br />

attacks and is effectively applied to many sensors such as GPS, heading and depth sensors;<br />

n Command link encryption;<br />

n Use of multiple command links, effectively providing command link backup.<br />

n BIT testing to verify the integrity of firmware and mission and configuration data at run time.<br />

13.6.6 A Cyber Security Analysis should be conducted to identify possible security vulnerabilities and their effects on<br />

the vital systems and the performance of the craft or vessel, including but not limited to the command link, the<br />

generation and dissemination of waypoints, steering, and the ability to initiate Emergency Stop..<br />

13.6.7 The Cyber Security Analysis should be interpreted and acted upon in a manner similar to the Risk Assessment,<br />

in terms of identifying the need to apply corrective measures to reduce risk to an acceptably low level.<br />

Fugro FAS900<br />

104 MASS UK Industry Conduct Principles and Code of Practice Version 7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!