Posts

Showing posts from March, 2025

'LNG carrier/FPSO' floating OT on the sea

Image
'LNG carrier/FPSO' floating OT on the sea OT refers to hardware and software systems that monitor and control physical processes, especially in industries like energy, oil & gas, and transportation. Special vessels such as LNG Carriers (Liquefied Natural Gas Carriers) and FPSOs (Floating Production Storage and Offloading) are considered floating industrial plants because they have complex automation systems that manage critical industrial processes at sea. These processes directly impact operational safety, efficiency, and environmental compliance. 1. Characteristics of LNG Carriers and FPSOs as OT Systems These vessels contain numerous OT components due to their industrial operations: LNG Carrier - Transporting Liquefied Natural Gas :  An  LNG Carrier  is a specialized ship designed to  transport natural gas in liquid form (LNG) at -162°C . This liquefaction reduces gas volume by  600 times , making long-distance transport efficient. Core Processes...

Why Secure Remote Access is Crucial in the Era of Autonomous Ships

Image
  Why Secure Remote Access is Crucial in the Era of Autonomous Ships As ships become increasingly autonomous, secure remote access is critical to ensure operational efficiency, cybersecurity, and regulatory compliance. Here’s why: 1. Increased Cyber Threats to Ships Autonomous ships rely on networked control systems , making them more susceptible to cyberattacks like malware, ransomware, and unauthorized access. Hackers could take control of navigation, propulsion, or communication systems , leading to severe consequences. Examples: GPS spoofing , malware injection into onboard systems, or denial-of-service (DoS) attacks on ship networks. 2. Regulatory Compliance (IACS UR E26 & E27, IMO Guidelines) IACS UR E26 & E27 require ships to implement cybersecurity frameworks, ensuring resilience against cyber threats. IMO’s MSC-FAL.1/Circ.3 recommends secure remote access methods for operational safety. Non-compliance can lead to detentions, loss of clas...

Ship Security: Scope, Schedule, Penalties, etc. for IACS UR E26 and E27 and other regulations

Image
  Let's talk about  IACS UR E26 and E27 and others   in detail including the scope, timeline, penalties etc. ​ The International Association of Classification Societies (IACS) has introduced Unified Requirements (UR) E26 and E27 to enhance the cyber resilience of ships and their onboard systems. Below is a detailed overview of their scope, implementation timeline, and compliance considerations.​ Scope of UR E26 and E27 UR E26: Cyber Resilience of Ships Objective : Establishes minimum requirements for the cyber resilience of ships throughout their design, construction, commissioning, and operational life. ​ Key Functional Aspects: Identify : Maintain an inventory of hardware and software for applicable Computer-Based Systems (CBSs) and document network arrangements. Protect : Implement security zones, network segmentation, access controls, and protections against malicious code. Detect : Monitor network operations and perform verification and diagnost...

How to get certified by applying ISO 27001 standard to OT security?

Image
What is the ISO 27001 standard and how do you get certified to apply this global standard to OT security? ISO 27001 is an international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS) . It provides a systematic approach to managing information security risks and protecting sensitive data. To comply with ISO 27001, organizations must meet several mandatory requirements and prepare specific documents. 1. Mandatory Requirements of ISO 27001:2022 ISO 27001:2022 defines specific clauses that organizations must comply with to establish and maintain an ISMS. These requirements are covered in clauses 4 to 10 : Clause 4: Context of the Organization Identify internal and external issues affecting the ISMS. Define the scope of the ISMS. Identify interested parties (e.g., employees, customers, suppliers) and their expectations. Clause 5: Leadership Establish information security policies and ensure ...

Let's do PLC Ladder Programing for the traffic light and also hack this!

Image
  Let's do PLC Ladder Programing for the traffic light and also hack this! Ladder logic is commonly used in the  PLC  for industrial automation. This post explains: Provide a traffic light ladder logic program. Explain in detail how to download this logic to a PLC. Identify a tag value that could cause a system breakdown. Step 1: Traffic Light Ladder Logic Program The following logic simulates a simple traffic light system with Red, Yellow, and Green lights using a timer-based approach. |----[Start]---------------- --- - - [TON T1, 10s]----( Red_Light )---| | | | |----[TON T2, 3s]----( Yellow_Light )---| | | | |----[TON T3, 10s]----( Green_Light )---| | | | |----[TON T4, 1s]----( Cycle_Reset )---| How It Works: T1 (10s) → Turns Red Light ON . T2 (3s) → After Red, Yellow Light turns ON . T...