Solution Development and Evaluation in Handling Shipboard Email Problems
Solution Development and Evaluation in Handling Shipboard Email Problems
interact with a system, to use system resources to handle information, to gain knowledge of the
information the system contains or to control system components and functions.
Back door is a secret method of bypassing normal authentication and verification when accessing
a system. A back door is sometimes created in hidden parts of the system itself or established by
separate software.
Bring your own device (BYOD) allows employees to bring personally owned devices (laptops,
tablets, and smart phones) to the ship and to use those devices to access privileged information and
applications for business use.
Chain of custody is the chronological documentation or paper trail that records the sequence of
custody, control, transfer, analysis, and disposition of physical or electronic evidence.
Cyber attack is any type of offensive manoeuvre that targets IT and OT systems, computer networks,
and/or personal computer devices and attempts to compromise, destroy or access company and ship
systems and data.
Cyber incident is an occurrence, which actually or potentially results in adverse consequences to an
onboard system, network and computer or to the information that they process, store or transmit,
and which may require a response action to mitigate the consequences.
Cyber risk management means the process of identifying, analysing, assessing, and communicating
a cyber-related risk and accepting, avoiding, transferring, or mitigating it to an acceptable level by
taking into consideration the costs and benefits of actions taken by stakeholders.
Cyber system is any combination of facilities, equipment, personnel, procedures and communications
integrated to provide cyber services; examples include business systems, control systems and access
control systems.
Defence in breadth is a planned, systematic set of activities that seek to identify, manage, and reduce
exploitable vulnerabilities in IT and OT systems, networks and equipment at every stage of the system,
network, or sub-component life cycle. Onboard ships, this approach will generally focus on network
design, system integration, operations and maintenance.
Defence in depth is an approach which uses layers of independent technical and procedural measures
to protect IT and OT on board.
Digitisation is the conversion of analogue information to digital information.
Digitalisation is how the digital world impacts people and work.
Executable software includes instructions for a computer to perform specified tasks according to
encoded instructions.
Firewall is a logical or physical break designed to prevent unauthorised access to IT infrastructure and
information.
Firmware is software imbedded in electronic devices that provides control, monitoring and data
manipulation of engineered products and systems. These are normally self-contained and not