Cyber Management Course (Ma) – Module 6
Checklists of venerable equipment – Introduction
The following are common cyber vulnerabilities, which may be found onboard both existing ships, and on newbuild ships:
obsolete and unsupported operating systems
outdated or missing antivirus software and protection from malware
inadequate security configurations and best practices, including ineffective network management and the use of default administrator accounts and passwords,
shipboard computer networks, which lack boundary protection measures and segmentation on networks
safety critical equipment or systems always connected with the shore side
inadequate access controls for third parties including contractors and service providers.