TVIB News News and Updates

DHS: Cybersecurity – Protecting Network Infrastructure

08/10/2017 – excerpt from August 9th post titled “Protecting Network Infrastructure”

The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat levels place more demands on security personnel and network administrators to protect information systems. Protecting the network infrastructure is critical to preserve the confidentiality, integrity, and availability of communication and services across an enterprise.

Network infrastructure consists of interconnected devices designed to transport communications needed for data, applications, services, and multi-media. Routers and firewalls are the focus of this alert; however, many other devices exist in the network, such as switches, load-balancers, intrusion detection systems, etc. Perimeter devices, such as firewalls and intrusion detection systems, have been the traditional technologies used to secure the network, but as threats change, so must security strategies. Organizations can no longer rely on perimeter devices to protect the network from cyber intrusions; organizations must also be able to contain the impact/losses within the internal network and infrastructure.

For several years now, vulnerable network devices have been the attack-vector of choice and one of the most effective techniques for sophisticated hackers and advanced threat actors. In this environment, there has never been a greater need to improve network infrastructure security. Unlike hosts that receive significant administrative security attention and for which security tools such as anti-malware exist, network devices are often working in the background with little oversight—until network connectivity is broken or diminished.

If the network infrastructure is compromised, malicious hackers or adversaries can gain full control of the network infrastructure enabling further compromise of other types of devices and data and allowing traffic to be redirected, changed, or denied. Possibilities of manipulation include denial-of-service, data theft, or unauthorized changes to the data.

Intruders with infrastructure privilege and access can impede productivity and severely hinder re-establishing network connectivity. Even if other compromised devices are detected, tracking back to a compromised infrastructure device is often difficult.

Malicious actors with persistent access to network devices can re-attack and move laterally after they have been ejected from previously exploited hosts.

The link below contains the full text of the post and addressees their summary of six prevention measures to help system users and administrators provide a more secure and efficient network infrastructure.

Click here to read the original post by DHS in full.

 

 

NTSB Publishes Safer Seas Digest 2016

07/27/2017 – Excerpt from Press Release

The lessons learned from the investigation of 27 major, maritime accidents involving loss of life, injuries and property damage are detailed in the National Transportation Safety Board’s Safer Seas Digest 2016, released online Thursday.

The publication is a compendium of the marine accident reports that the agency adopted or issued during calendar year 2016. The 68-page Safer Seas Digest 2016 contains information that can help mariners at the deckplate level prevent future accidents, and, can help maritime industry C-suites build and sustain a culture of safety at sea.

The lessons learned in the Safer Seas Digest 2016 are highlighted in 10 categories including Standard Maintenance and Repair Procedures, Operational Testing Procedures, Operating in Strong Currents, Familiarization with Local Recommendations, Bridge Resource Management, Safety Equipment and Access to High-Risk Spaces.  The remaining three categories, Distraction, Fatigue, and Use of Medication While Operating Vessels, relate to issues on the NTSB’s Most Wanted List of Transportation Safety Improvements, highlighting the multi-modal nature of these threats to transportation safety.

“A safe maritime transportation system is critical to the vitality of the U.S. economy,” said NTSB Acting Chairman Robert Sumwalt. “According to NOAA, more than $1.5 trillion of cargo transited U.S. seaports in 2016.  Reducing the frequency and severity of maritime accidents serves the national interest and publishing the Safer Seas Digest helps reach this goal.”

The Safer Seas Digest 2016 digital version (a print version will be distributed to industry stakeholders) provides mariners with links from the digest’s case summaries to the full reports and related documents of the investigations on the NTSB’s website, giving mariners access to the complete body of work of the NTSB’s Office of Marine Safety.

The NTSB’s Office of Marine Safety investigates major marine casualties upon the navigable waters of the U.S. and accidents involving U.S. flagged vessels worldwide.

Click here to download the full report.

 

SUBCHAPTER M: USCG Accepting Applications for Endorsements of Tankerman Person In Charge (PIC) Restricted to Fuel Transfers on Towing Vessels

08/04/2017 – Reproduced from notice written by Captain Kirsten R. Martin

The Coast Guard is now accepting applications for Tankerman PIC Restricted to Fuel Transfers on Towing Vessels. A new checklist and sample sea service letter are available on the NMC website to assist mariners with these applications.

CG-MMC Policy Letter 01-17, Guidelines for Issuing Endorsements for Tankerman PIC Restricted to Fuel Transfers on Towing Vessels, was published on March 10, 2017, and provides additional information for employers and mariners. Endorsements will be issued in accordance with the provisions for a restricted tankerman endorsement (46 CFR 13.111(a)), in order to meet the requirement of 33 CFR 155.710(e)(1).

Questions or feedback on the policy should be directed to MMCPolicy@uscg.mil. The status of individual applications can be determined by contacting the NMC Customer Service Center using Live Chat, by calling 1-888-IASKNMC (427-5662), or via e-mail to IASKNMC@uscg.mil.

Click here to access the full NMC notification document.