Tag: Korean Register

Filter By:

Filter

KR certifies first cybersecurity compliant vessel

Classification Society, Korean Register (KR), completed a comprehensive cyber security survey onboard the chemical/oil tanker Songa Hawk and certified the ship to be fully compliant in all areas. Following the survey, the Marsall-Islands flag vessel becomes the first ship to acquire this type of certification. The company has inked a five-year cybersecurity contract with KR in 2018, covering its fleet of 23 vessels.

Read more

KR issues guidelines for Type Approval of Maritime Cyber Security

In its February 2020 newsletter, the Korean Register informs that the cyber security type approval has been developed based on international standards such as ISA 62443 4-2, IEC 61162-460, and inspect cyber security level and function of cyber systems including remote access equipment; integrated control and monitoring systems on board the ship. The security requirements and their levels are verified on 12 categories and 124 requirements.

Read more

OWASP Top 10 IoT: Understanding cyber threat

In its February 2020 newsletter the Korean Register informs that that the goal of the OpenWeb Application Security Project (OWASP)’s  Things Internet Project is to help manufacturers, developers, and consumers further understand more accurately the security issues associated with the Internet of Things and help users make wiser decisions in terms of security when building, distributing or evaluating IoT technology. Namely, in the infographic provided, OWASP informs about the ten vulnerabilities concerning the IoT.

Read more

Liability and countermeasures for wireless networks

In its February 2020 newsletter, the Korean Register introduces wireless networks in relation to their vulnerability and potential countermeasures. It is said that wireless networks are often used in environments in the existing concept of wired LAN expansion; and most of them are composed of the form of connecting wireless AP to existing wired LANs and installing wireless LAN cards to clients. Thus, the separation of wired LAN and wireless LAN is not considered at all- KR stresses that this constitutes a security problem.

Read more
Page 3 of 9 1 2 3 4 9