
342741/B
13
Kongsberg Maritime has no information regarding the complete system installation on
any vessel. Systems provided by Kongsberg Maritime are regarded as stand-alone offline
systems. They are stand-alone even though they may be connected to a network for
sensor interfaces and/or data distribution.
Note
No network safety applications are installed on Kongsberg Maritime computers. The
computers are therefore not protected against viruses, malware or unintentional access
by external users.
Securing the K-Sync system itself has no meaning unless there is a policy in place that
secures all computers in the network. This policy must include physical access by
trained and trusted users. The customer/end user of the K-Sync system will always be
in charge of defining and implementing a security, policy and providing the relevant
network security applications.
Note
Kongsberg Maritime will not accept any responsibility for errors and/or damages caused
by unauthorized use of or access to the K-Sync system.
If you wish to connect the K-Sync system to the ship's local area network, you must
implement the same security mechanisms on the K-Sync computer(s) as for the rest of
the network. This is a task for the network responsible person on board. Some key
elements here must be:
• The same anti-virus protection on all computers, including routines for updating
this protection.
• The same settings for the firewall on all computers.
• Controlled physical access to computers on the network.
• Trusted and trained operators.
• Log-in access mechanisms.
• Same policy for attaching peripheral equipment to the computers (USB devices,
hard drives etc).
• Installation of programs on any computer in the network, verification that each
program is authentic.
• Definition of which programs are allowed to run on each computer.
• Logging mechanism of computer activity, and inspection of these logs.
How to define and implement these rules depends on each end user's network system
configuration, which again must be a result of the policies and threat levels the end user
has defined for the complete installation. For some products the network consists of only
processor units and/or work stations, transceivers and a few sensors. On other vessels,
larger computer systems can be installed to include numerous products and data systems.
There must be one responsible person for the security of the system, large or small.
Summary of Contents for K-Sync
Page 6: ...6 342741 B KONGSBERG K Sync ...
Page 49: ...342741 B 49 Cable layout and interconnections ...
Page 71: ......
Page 72: ... 2021 Kongsberg Maritime ...