Noise Sources; Network Security - Kongsberg EA640 Installation Manual

Hydrographic single beam echo sounder
Hide thumbs Also See for EA640:
Table of Contents

Advertisement

Noise sources

The operational performance of the EA640 system depends on the noise conditions. It
is essential that the noise signature is as low as possible.
The vessel's hull, rudder(s) and propeller(s) must be thoroughly inspected in dry dock
prior to installation.
Roughness below the water-line deformities in the shell plating and protruding obstacles
can create underwater noise. These sources of turbulence must be smoothed or removed
as best as possible.
Note
It is especially important that the propeller(s) are not pitted or damaged.

Network security

If a EA640 system is connected to a local area network, data security is important.
Equipment manufactured by Kongsberg Maritime is frequently connected to the vessel's
local area network (LAN). When you connect a computer to a local area network you
will always expose the data on that computer. All other computers connected to the same
network may be able to access your data. Several threats may immediately occur:
• Remote computers can read the data.
• Remote computers can change the data.
• Remote computers can change the behavior of the computer, for example by installing
unwanted software.
Usually, two parameters are used to define the threat level:
1
The likelihood that any remote computer will do any of the above.
2
The damage done if a remote computer succeeds doing this.
Kongsberg Maritime has no information regarding the complete system installation on
any vessel. Systems provided by Kongsberg Maritime are regarded as stand-alone offline
systems. They are stand-alone even though they may be connected to a network for
sensor interfaces and/or data distribution.
Note
No network safety applications are installed on Kongsberg Maritime computers. The
computers are therefore not protected against viruses, malware or unintentional access
by external users.
Securing the EA640 system itself has no meaning unless there is a policy in place that
secures all computers in the network. This policy must include physical access by
413764/C
EA640
17

Advertisement

Table of Contents
loading

Table of Contents