Cybersecurity Drill Report
Cybersecurity Drill Report
1. Drill Scenario
**Scenario: Cyber Intrusion Leading to Navigation and Communication Disruption**
A malicious actor has gained unauthorized access to the ship’s network, causing disruptions
to navigational systems (ECDIS) and communication (email and satellite systems). The
ship’s crew must detect, contain, and report the breach while coordinating with the shore
office for mitigation.
2. Drill Objectives
• Assess the crew’s ability to detect and respond to a cyber intrusion.
• Test communication protocols between ship and shore.
• Ensure backup procedures are in place for critical systems.
• Identify vulnerabilities in the cybersecurity response plan.
3. Drill Planning
Pre-Drill Preparation
**Ship Side:**
✔ Inform key personnel about the drill (Master, Chief Engineer, ETO, IT Officer).
✔ Ensure backup systems (manual charts, alternative communication) are ready.
✔ Review cybersecurity procedures and response checklists.
**Shore Side:**
✔ IT department sets up a simulated cyber threat (e.g., phishing email, malware attack).
✔ Incident Response Team (IRT) is on standby for coordination.
✔ Ensure reporting and escalation mechanisms are functional.
4. Post-Drill Report
**Drill Details**
- **Drill Name:** Cyber Intrusion Leading to Navigation and Communication Disruption
- **Date of Drill:** [Insert Date]
- **Location:** [Ship Name] & [Shore Office Location]
- **Participants:**
- Ship Crew: Master, Chief Engineer, ETO, IT Officer, Navigation Team
- Shore Team: IT Department, Incident Response Team (IRT), Operations Manager
- **Drill Coordinator:** [Name of Coordinator]
**Key Findings**
- **Strengths:**
✔ Quick detection by ship’s IT Officer and ETO.
✔ Effective communication between ship and shore.
✔ Successful containment and recovery procedures.
**Conclusion**
The cybersecurity drill was successfully executed, demonstrating the crew’s ability to detect
and respond to a cyber threat. While communication and containment were effective,
improvements in training, response speed, and backup restoration are recommended.
Follow-up actions will be taken to strengthen cybersecurity measures onboard.
**Approved by:**
[Name]
[Designation]
[Company Name]
[Date]