Cyber Operators Course (Op) – Module 6

Communication equipment and security – VOIP (Voice over Internet Protocol)

VoIP is basically a telephone connection over the Internet. The data is sent digitally, using the Internet Protocol (IP) instead of analogue telephone lines. In order to use VoIP, you need a computer, an Internet connection, and VoIP software. You also need a microphone, analogue telephone adapter, or VoIP telephone.  Many VoIP programs like skype and TeamSpeak allow you to use a basic microphone and speaker setup. Others require VoIP phones, which are like regular telephone handsets, but typically connect to your computer via USB. Analogue telephone adapters allow you to use regular phones with your computer. IP phones are another option that connect directly to a router via Ethernet or wirelessly. These phones have all the necessary software for VoIP built in and therefore do not require a computer.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – VPN (Virtual Private Network)

Virtual Private Network enables you to send and receive data across networks as if their device was somewhere else. It hides your identity even from your network provider.

VPN use is good practice for any user. It provides privacy. How the crew use a VPN is another matter, but it’s on the crew network, so can be reasonably ignored so long as good segregation is present. VPNs will also be present on board for business use.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – VPN (Virtual Private Network)

VPN’s are sometimes regarded as an ‘anti-system’ program, but it depends what you use it for. Some use VPN’s to browse illegal websites. Others just use it to watch videos as if they were based in different countries. So a Virtual Private Network works by using encryption and other security measures, a VPN can scramble all the data sent through the wide area network, so the network is “virtually” private.

Businesses often use VPNs to communicate across multiple locations. For example, a large company that has offices in several cities may need to send Information to the different locations via the Internet and make sure it’s done securely so it can’t be hacked. To keep the information secure, the company might set up a VPN with an encrypted connection.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – SSL Certificate

An SSL certificate, or secure certificate, is a file installed on a secure Web server that identifies a website. This digital certificate establishes the identity and authenticity of the company or merchant so that online shoppers can trust that the website is secure and reliable. In order to verify that these sites are legitimate (they are who they say they are), the companies and their websites are verified by a third party. When going to these webpages, you will notice that they are slightly more different! How? By looking at the Hypertext Transfer Protocol type in the address bar. It will say HTTPS Instead of HTTP These Can then be viewed by a person if they want to know more details about the company who is selling.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Basic Checks

‘Always-on’ can be the downfall of a vessel if its cyber security is not addressed. From being an isolated (and therefore more secure) environment when at sea, a ship is now just as connected as many offices. Yet, cyber security is usually an afterthought, if even considered at all.

Basic satellite equipment checks

Administration passwords

Access from the public internet

Terminal software version

Physical security of the terminal

By far the most common problem: the satellite terminal installer hasn’t changed the administration passwords from the default admin/admin, admin/1234 or similar. Ensure the passwords are complex and only known by those who need to know.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – How to Hack your SATCOM

A hacker could easily access the terminal administration interface, use a default password and then take control of the satellite terminal. They may also be able to then access more critical networks on the vessel

For example, if the password is default, a hacker can easily downgrade the software and introduce security flaws. Here’s an example of a downgrade attack in a Cobham terminal. Even if the password was then changed, the hacker would still have access!

Number 2: Make sure the ships satcom system isn’t on the public internet!

Cyber Operators Course (Op) – Module 6

Communication equipment and security – How to Hack your SATCOM

Most airtime providers offer a private IP address space, so hackers can’t reach your satcom system as easily over the internet.

It’s easy to find out if your vessel terminals are public or not: put the IP address in a browser and see if you can route to the terminal web interface from the public internet. Or you could port scan it. Speak to your airtime provider and check.

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – NAVTEX Security Recommendations

It is clear that Navtex messages should be verified. This can be done in several ways

Online Navtex services are available – it would be trivial to check on a mobile phone when in range of land, or via a vessel satcom terminal.

Check over VHF with the coastguard or other relevant authority.

Sat-C Navtex broadcasts are also available.

Auto-population of the chart on an ECDIS with Navtex data is relatively rare currently, but it’s likely to become more common, primarily to avoid manual data entry mistakes in plotting Navtex alert areas when inputting coordinates.

Is that message on the ECDIS real or fake, or is an important message completely missing?

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – ECDIS security

An ECDIS is usually just a desktop computer. It may have a rugged case, screen and keyboard, but it is fundamentally just a PC.

Just like any computer, it requires updates to be applied, both to the underlying operating system, to its ECDIS software and to the digital charts. If any of those are omitted for any period of time, cyber security vulnerabilities creep in.

ECDIS are increasingly being connected to vessel networks to facilitate online chart updates, integration with other bridge systems and remote maintenance. Security flaws that did not matter so much in the past through a lack of connectivity are now becoming very important.

Even having dual redundant ECDIS on the bridge is no guarantee of availability: during research we discovered similar security flaws on multiple ECDIS brands. A hacker would have little difficulty in compromising both.

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – ECDIS USB security

The ECDIS system case must be kept in a robust locked cabinet to which only senior personnel have access. It should not be possible for other personnel to access the system case or any of the USB and network ports on it.

A source of several ECDIS security incidents has been from crew charging smartphones from the USB ports. Phones that have not been kept up to date may already be infected with malware.

Many ECDIS have USB ports present on their keyboards, as shown in the example below. Operators frequently report that, despite multiple ‘safe’ USB charging points being made available on the bridge, crew still charge phones from the ECDIS.

With this in mind, seriously consider installing USB port blockers such as the below. Whilst they are not difficult to remove, they do provide a visual deterrent to casual charging.