Cyber Security System

Increase of Attack Surface from Cyber Attack

• Expansion and Development of IT technology
• Increase of IT devices and tools
• Adoption of Extensive IT system
• Introduction of e-Navigation
• Application of Technology for Autonomous Ship

Download Catalogue

Key Features

    • Role of System Integrator
    • Documents for UR E26
    • Supply of Network
    • Risk Assessment
    • Penetration Test
    • OT&IT Cyber Security Configuration
    • Maintenance of Network device








    Requirements of IACS UR E26

    • Targeting Cyver Resillence of Ship meeting velow Five Frameworks
    • Apply to the Ships Contracted on or after January 1, 2024