Maritime Cybersecurity Project

Maritime Cybersecurity Project

MARITIME CYBERSECURITY PROJECT 1. Risk-Based Performance Standards Recommendation 2. Framework for Cyber Policy 3. Critical Points of Failure 4. Requirements for Maritime Cyber Range 5. Framework for Point of Failure Detection Methodology 6. Maritime Cyber Deterrent Strategy Effectiveness MARCH 9, 2018 This material is based upon work funded by the U.S. Department of Homeland Security under Cooperative Agreement No. 2014-ST-061-ML0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security. Maritime Cybersecurity Project Contents 1. Introduction .......................................................................................................................................... 1 1.1. Intended Audiences ...................................................................................................................... 1 1.2. Intended Processes ....................................................................................................................... 2 1.3. Guiding Principles ......................................................................................................................... 2 2. U.S. Marine Transportation System (MTS) ........................................................................................... 2 3. Analytical Scope .................................................................................................................................... 5 3.1. Asset Classes ................................................................................................................................. 5 3.2. Systems ......................................................................................................................................... 6 3.3. Threats ........................................................................................................................................ 10 3.4. Vulnerabilities ............................................................................................................................. 10 3.5. Consequences ............................................................................................................................. 10 4. Common IT/OT Systems ...................................................................................................................... 10 4.1. Vessel Systems ............................................................................................................................ 10 4.2. Facility/Infrastructure Systems ................................................................................................... 11 5. Literature Review ................................................................................................................................ 12 6. NIST Framework Core Mapping .......................................................................................................... 40 7. Recommended Risk-based Performance Standards (RBPSs) .............................................................. 44 7.1. Owner/Operator Has Not Yet Developed a Cybersecurity Program .......................................... 44 7.2. Owner/Operator Has Implemented an IT Cybersecurity Program ............................................. 45 7.3. Owner/Operator Has Implemented an IT/OT Cybersecurity Program ....................................... 46 8. Regulatory Oversight .......................................................................................................................... 50 8.1. Security Management Systems ................................................................................................... 52 8.2. Safety Management Systems ...................................................................................................... 55 9. Framework for Point of Failure Detection Methodology ................................................................... 59 9.1. Background ................................................................................................................................. 59 9.2. Engineering Principles ................................................................................................................. 60 9.3. Framework .................................................................................................................................. 61 9.3.1. Cyber Complexity ................................................................................................................ 62 9.3.2. Business Attributes ............................................................................................................. 63 9.3.3. Cybersecurity Documentation Attributes ........................................................................... 64 10. Critical Points of Failure ................................................................................................................. 67 i Maritime Cybersecurity Project 10.1. Background ............................................................................................................................. 67 10.2. Risk Assessment ...................................................................................................................... 70 10.2.1. Security Risk Assessment Methodologies ........................................................................... 70 10.2.2. Challenges in Cybersecurity Risk Assessment ..................................................................... 72 10.3. Reference Model ..................................................................................................................... 74 10.3.1. Triads ................................................................................................................................... 74 10.3.2. Taxonomy ............................................................................................................................ 75 10.4. Calculation............................................................................................................................... 79 10.4.1. Special Case of the VLN Connection .................................................................................... 79 10.5. Application .............................................................................................................................. 88 10.6. Conclusion ............................................................................................................................... 89 11. Maritime Cyber Deterrent Strategy Effectiveness ......................................................................... 90 11.1. USCG Risk Assessment Models ............................................................................................... 90 11.1.1. Port Security Risk Assessment Tool (PSRAT) ....................................................................... 91 11.1.2. National Risk Assessment Tool (NRAT) ............................................................................... 91 11.1.3. National Maritime Strategic Risk Assessment (NMSRA) ..................................................... 92 11.1.4. MSRAM ............................................................................................................................... 93 11.1.5. Layered Return-on-Investment (L-ROI) Model ................................................................... 93 11.1.6. PWCS Risk-Based Performance Model ............................................................................... 94 11.2. Cyber Decision Support Requirements ................................................................................... 94 11.2.1. Needed Information ............................................................................................................ 96 11.3. Application .............................................................................................................................. 96 11.4. Model ...................................................................................................................................... 97 11.4.1. Scenarios ............................................................................................................................. 97 11.4.2. Threat ................................................................................................................................ 100 11.4.3. Vulnerability ...................................................................................................................... 101 11.4.4. Consequences ................................................................................................................... 104 11.4.5. Types of Consequences & Results..................................................................................... 104 11.4.6. Outputs & Results ............................................................................................................. 105 11.4.7. Cyber Deterrent Strategy Development ........................................................................... 107 12. Requirements for Maritime Cyber Range .................................................................................... 107 12.1. Strategic Priorities ................................................................................................................. 107 12.2. Cyber Ranges ........................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    173 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us