Test 2 Flashcards

1
Q

Dating back to World War I, national measures focused on

A

Open hostilities and internal threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Prior to 9/11, international measures focused on

A

Hijacking and terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What were the measurements taken by the I MO and US government prior to 9/11?

A

Establishment of the captains of the port construct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Was cyber security and original goal of the I SPS/MTS a?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Did the objectives of the ISPS/MTSA enhance commercial industry?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where is the I SPS found?

A

SOLAS chapter 11 - two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where is the MTSA found?

A

33CFR parts 104 and 105

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the I SPS apply to?

A

International voyages, passenger ships, cargo ships greater than 500 gross tons, MODU, port facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What changes were brought about by the ISPS?

A

Implementation of VSO, CSO, FSO construct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Significant results of MTSA?

A

National targeting center
CBP
Maritime intelligence fusion centers
Maritime operational threat response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is required by the MTSA but not the ISPS?

A

TWIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AIS accelerated

A

Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSAS came from

A

ISPS/MTSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MIFCs

A

Maritime intelligence fusion centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MSSTs

A

Maritime safety and security teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is MOTR and what does it process?

A

Maritime operational threat response

Boardings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Does the IMO set security levels?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security level 1

A

Normal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Security level 2

A

Heightened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Security level 3

A

Exceptional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Organization or administration identified within the contracting government as responsible for ensuring the implementation of the provisions of SOLAS chapter 11-2?

A

Designated authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Legal implications of action/non-action

A

No known serious negative implications to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

International ship security certificates are valid for

A

5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who was the lead agency for USA at the IMO ISPS convention?

A

USCG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Initially was there direct mention of piracy or cyber attacks?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Organization with appropriate expertise in security matters and knowledge of ship and port operations authorized to carry out an assessment or verification, or an approval or certification activity?

A

Recognized security organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Generally a recognized security organization in the us is the

A

Classification society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The process of developing and updating a VSP is a

A

VSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When must a drill be held?

A

Every 3 months or within a week if 25% of crew change

30
Q

Exercise must be held

A

Annual

31
Q

Information, that of publicly released would be detrimental to transportation security

A

SSI

32
Q

Agreement between ship and port or another vessel specifying security measures

A

DOS

33
Q

Location determined by contracting government or designated authority where a ship/port interface takes place

A

Port facility

34
Q

Docks, anchorage, waiting berths

A

Port facility

35
Q

Movements of persons, goods or provisions

A

Ship/port interface

36
Q

Incident not resulting in a transportation security incident in which security measures have been circumvented, eluded, or violated

A

Breach of security

37
Q

Security incident resulting in a significant loss of life, environmental damage, transportation disruption or economic disruption in a particular area

A

Transportation security incident

38
Q

Give examples of training requirements for a VSO

A

Security administration
Relevant conventions codes
Relevant government legislation
Ship and port operations and conditions
Ship and port facility security measures
Knowledge of current security threats and patterns
Assessment of security drills and exercises

39
Q

What is the purpose of drills and exercises?

A

Crew proficiency

40
Q

Can drills and exercises be combined?

A

Yes

41
Q

Who carries out the VSA?

A

CSO

42
Q

When the VSA and VSP are in place the ship can apply for a

A

International ship security certificate

43
Q

VSPs are audited

A

Annually

Or if ownership changes or substantial structural modifications

44
Q

Security records shall be kept onboard for

A

2 years

45
Q

What entries are made in the security log?

A
Training drills and exercises 
Security threats and incidents 
Breaches of security 
Changes in security level 
Comma related to security of ship 
Internal audit 
Review of assessment 
Review of plan
Amendment to plan
Maintenance of security equipment
46
Q

List the costs associated with anti-piracy measures

A
Cost of PMSC (4-8k)
Fuel for diverting 
Insurance premiums 
Security equipment 
Maintaining security equipment 
Labor associated with deployment of equipment 
Loss of man hours to routine functions
47
Q

Total cost for one company anti-piracy measures

A

20%

48
Q

Intertanko industry estimate (2014)

A

2.2-2.3 billion dollars

49
Q

List the costs of a piracy incident

A
Injury/death of personnel 
Damage or loss of vessel 
Time off hire
Damage to reputation 
Time and expense of crisis management process
50
Q

What is standing guidance?

A

Documents

51
Q

List some standing guidance

A
VSA
VSP
BMP5
MSC circulars (1334, 1405, and 1408)
BIMCO, GUARDCON
Nautical institute
CFR 33 & SOLAS 11-2
52
Q

Name some current intel sources

A
ONI
IMB
USCG
MARINE SECURITY REVIEW 
COMBINED MARITIME FORCES 
CTF 150, 151, and 152
OCEANS BEYOND PIRACY 
RECAAP
MARAD MSCI PORTAL
53
Q

How much do PMSCs cost?

A

4-8k/day

54
Q

BMP5 is

A

Recommendations and guidelines

55
Q

BMP5 is set forth by

A

International commercial consortium

56
Q

BMP5 recommends to only send

A

Basic AIS messages

57
Q

Can the master turn off AIS?

A

Yes

58
Q

SSI musts

A

Lock up all SSI
Destroy when no longer needed
Mark with header and footer

59
Q

Give examples of SSI

A
VSA
VSP
All security records 
Security directives, including MARSEC
Threat reporting 
Some NVICs
60
Q

VSA
VSP
ALL SECURITY RECORDS

A

Internal/shipboard documents

61
Q

Directives
Threat reporting
NVICs

A

External documents

62
Q

What systems were compromised with the UK jamming experiment?

A
DGPS receivers
AIS transponders 
DP system 
Gyro system 
DSC
63
Q

What is the most vulnerable cyber attack point?

A

Human element

64
Q

Motivation of cyber criminals

A

Stealing money
Theft of goods
Stealing data
Causing disruption

65
Q

What are the class notations for cyber security?

A

CS1 informed cyber security implementation
CS2 rigorous
CS3 adaptive

66
Q

Has any vessel been commandeered or hull damage due to cyber attack?

A

No

67
Q

Iranian shipping line IRISL

A

Successful attack in 2011

68
Q

Icefog

A

Successful cyber attack 2013

69
Q

MAERSK attack

A

Petya ransomware attack 2017

300-400 million

70
Q

10 key points from the navigator

A
Attacks happen
Data protection
Personal risk
Know your weaknesses
Be prepared
App awareness 
Social skills
Jamming and spoofing
Risk training
Want to know more