{"id":72810,"date":"2021-09-09T16:22:30","date_gmt":"2021-09-09T13:22:30","guid":{"rendered":"https:\/\/azbuki.bg\/?p=72810"},"modified":"2021-09-09T16:22:30","modified_gmt":"2021-09-09T13:22:30","slug":"approach-to-ships-it-and-ot-systems-cybersecurity-improvement","status":"publish","type":"post","link":"https:\/\/strategies.azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/","title":{"rendered":"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement"},"content":{"rendered":"<p><strong>Stoyno Stoynov, Borislav Nikolov<\/strong><br \/>\n<em>Nikola Vaptsarov Naval Academy (Bulgaria)<\/em><\/p>\n<p><a href=\"https:\/\/doi.org\/10.53656\/ped21-7s.16appr\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.53656\/ped21-7s.16appr<\/a><\/p>\n<p><strong>Abstract.<\/strong> Daily cyber-attacks on ships\u2019 IT and OT systems are not a rare occurrence anymore. This has been taken into account in recent years and the IMO has issued directives and circulars with recommendations for increasing the cybersecurity of ship information systems as part of the overall ship security system. The effect of a successful cyber-attack of any kind, on elements of the ship\u2019s IT and OT systems, can have a disastrous impact not only on the ship itself but also on the environment. While modern ships can be designed and all modern methods implemented to reduce and prevent the possibility of cyber-attacks onboard existing ships, it is not possible to achieve this security level and it is necessary to implement various solutions. At the same time, the ships\u2019 crew is declining worldwide and most ships do not have IT officers or trained staff onboard to maintain the ship\u2019s information systems. Because of that, the solutions that need to be put in place to increase the security of ship&#8217;s information systems must be easy to implement, use, and maintain. This article examines the need and some technical solutions that can be used to improve the cybersecurity of ship\u2019s IT and OT systems in response to the existing cyber-attacks and threats in the global shipping and maritime industry.<br \/>\n<em>Keywords:<\/em> ship\u2019s information technology systems; ship\u2019s operational technologies systems; unified threat management; cybersecurity; cloud-based service; virtual appliance<\/p>\n<p><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/azbuki.bg\/wp-content\/uploads\/2021\/09\/Pedagogy_7s_21_Stoyno-Stoynov-Borislav-Nikolov.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Open the full text<\/a><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Stoyno Stoynov, Borislav Nikolov Nikola Vaptsarov Naval Academy (Bulgaria) https:\/\/doi.org\/10.53656\/ped21-7s.16appr Abstract. Daily cyber-attacks on ships\u2019 IT and OT systems are not a rare occurrence anymore. This has been taken into account in recent years and the IMO has issued directives and circulars with recommendations for increasing the cybersecurity of ship information systems as part of [&hellip;]<\/p>","protected":false},"author":124332423426818,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"subtitle":"","format":"standard","video":"","gallery":"","source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"single_blog_custom":"","parallax":"0","fullscreen":"0","sidebar":"","second_sidebar":"","sticky_sidebar":"0","share_position":"","share_float_style":"","show_share_counter":"0","show_view_counter":"0","show_featured":"0","show_post_meta":"0","show_post_author":"0","show_post_author_image":"0","show_post_date":"0","post_date_format":"","post_date_format_custom":"","show_post_category":"0","show_post_reading_time":"0","post_reading_time_wpm":"","show_post_tag":"0","show_prev_next_post":"0","show_popup_post":"0","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"","single_post_gallery_size":""}],"trending_post":"0","trending_post_position":"","trending_post_label":""},"jnews_primary_category":{"id":""}},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement - \u0410\u0437-\u0431\u0443\u043a\u0438<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement - \u0410\u0437-\u0431\u0443\u043a\u0438\" \/>\n<meta property=\"og:description\" content=\"Stoyno Stoynov, Borislav Nikolov Nikola Vaptsarov Naval Academy (Bulgaria) https:\/\/doi.org\/10.53656\/ped21-7s.16appr Abstract. Daily cyber-attacks on ships\u2019 IT and OT systems are not a rare occurrence anymore. This has been taken into account in recent years and the IMO has issued directives and circulars with recommendations for increasing the cybersecurity of ship information systems as part of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0410\u0437-\u0431\u0443\u043a\u0438\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Azbuki55\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-09T13:22:30+00:00\" \/>\n<meta name=\"author\" content=\"v.genkov@azbuki.bg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"v.genkov@azbuki.bg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/\"},\"author\":{\"name\":\"v.genkov@azbuki.bg\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/92cc38d6a11fb032bf6299efd22a71c5\"},\"headline\":\"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement\",\"datePublished\":\"2021-09-09T13:22:30+00:00\",\"dateModified\":\"2021-09-09T13:22:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/\"},\"wordCount\":268,\"publisher\":{\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/\",\"url\":\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/\",\"name\":\"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement - \u0410\u0437-\u0431\u0443\u043a\u0438\",\"isPartOf\":{\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#website\"},\"datePublished\":\"2021-09-09T13:22:30+00:00\",\"dateModified\":\"2021-09-09T13:22:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/strategies.azbuki.bg\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#website\",\"url\":\"https:\/\/vocedu.azbuki.bg\/en\/\",\"name\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\",\"description\":\"\u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u043d\u043e \u0438\u0437\u0434\u0430\u0442\u0435\u043b\u0441\u0442\u0432\u043e \u0437\u0430 \u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u0430\u0443\u043a\u0430\",\"publisher\":{\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vocedu.azbuki.bg\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#organization\",\"name\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\",\"url\":\"https:\/\/vocedu.azbuki.bg\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png\",\"contentUrl\":\"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png\",\"width\":250,\"height\":70,\"caption\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\"},\"image\":{\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Azbuki55\/\",\"https:\/\/www.instagram.com\/nion_azbuki\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/92cc38d6a11fb032bf6299efd22a71c5\",\"name\":\"v.genkov@azbuki.bg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3615ec69795d828958c71f5ecd30c623?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3615ec69795d828958c71f5ecd30c623?s=96&d=mm&r=g\",\"caption\":\"v.genkov@azbuki.bg\"},\"url\":\"https:\/\/strategies.azbuki.bg\/en\/author\/v-genkovazbuki-bg\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement - \u0410\u0437-\u0431\u0443\u043a\u0438","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/","og_locale":"en_US","og_type":"article","og_title":"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement - \u0410\u0437-\u0431\u0443\u043a\u0438","og_description":"Stoyno Stoynov, Borislav Nikolov Nikola Vaptsarov Naval Academy (Bulgaria) https:\/\/doi.org\/10.53656\/ped21-7s.16appr Abstract. Daily cyber-attacks on ships\u2019 IT and OT systems are not a rare occurrence anymore. This has been taken into account in recent years and the IMO has issued directives and circulars with recommendations for increasing the cybersecurity of ship information systems as part of [&hellip;]","og_url":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/","og_site_name":"\u0410\u0437-\u0431\u0443\u043a\u0438","article_publisher":"https:\/\/www.facebook.com\/Azbuki55\/","article_published_time":"2021-09-09T13:22:30+00:00","author":"v.genkov@azbuki.bg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"v.genkov@azbuki.bg","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/#article","isPartOf":{"@id":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/"},"author":{"name":"v.genkov@azbuki.bg","@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/92cc38d6a11fb032bf6299efd22a71c5"},"headline":"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement","datePublished":"2021-09-09T13:22:30+00:00","dateModified":"2021-09-09T13:22:30+00:00","mainEntityOfPage":{"@id":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/"},"wordCount":268,"publisher":{"@id":"https:\/\/vocedu.azbuki.bg\/en\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/","url":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/","name":"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement - \u0410\u0437-\u0431\u0443\u043a\u0438","isPartOf":{"@id":"https:\/\/vocedu.azbuki.bg\/en\/#website"},"datePublished":"2021-09-09T13:22:30+00:00","dateModified":"2021-09-09T13:22:30+00:00","breadcrumb":{"@id":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azbuki.bg\/en\/uncategorized\/approach-to-ships-it-and-ot-systems-cybersecurity-improvement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/strategies.azbuki.bg\/"},{"@type":"ListItem","position":2,"name":"Approach To Ship\u2019s It And Ot Systems Cybersecurity Improvement"}]},{"@type":"WebSite","@id":"https:\/\/vocedu.azbuki.bg\/en\/#website","url":"https:\/\/vocedu.azbuki.bg\/en\/","name":"\u0410\u0437-\u0431\u0443\u043a\u0438","description":"\u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u043d\u043e \u0438\u0437\u0434\u0430\u0442\u0435\u043b\u0441\u0442\u0432\u043e \u0437\u0430 \u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u0430\u0443\u043a\u0430","publisher":{"@id":"https:\/\/vocedu.azbuki.bg\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vocedu.azbuki.bg\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/vocedu.azbuki.bg\/en\/#organization","name":"\u0410\u0437-\u0431\u0443\u043a\u0438","url":"https:\/\/vocedu.azbuki.bg\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/logo\/image\/","url":"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png","contentUrl":"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png","width":250,"height":70,"caption":"\u0410\u0437-\u0431\u0443\u043a\u0438"},"image":{"@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Azbuki55\/","https:\/\/www.instagram.com\/nion_azbuki\/"]},{"@type":"Person","@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/92cc38d6a11fb032bf6299efd22a71c5","name":"v.genkov@azbuki.bg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3615ec69795d828958c71f5ecd30c623?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3615ec69795d828958c71f5ecd30c623?s=96&d=mm&r=g","caption":"v.genkov@azbuki.bg"},"url":"https:\/\/strategies.azbuki.bg\/en\/author\/v-genkovazbuki-bg\/"}]}},"_links":{"self":[{"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/72810"}],"collection":[{"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/users\/124332423426818"}],"replies":[{"embeddable":true,"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/comments?post=72810"}],"version-history":[{"count":1,"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/72810\/revisions"}],"predecessor-version":[{"id":72812,"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/72810\/revisions\/72812"}],"wp:attachment":[{"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/media?parent=72810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/categories?post=72810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/strategies.azbuki.bg\/en\/wp-json\/wp\/v2\/tags?post=72810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}