The document discusses security risks in the oil and gas industry from cyberattacks and physical attacks. It provides two examples: (1) The "Shamoon" virus attacked Saudi Aramco and RasGas, knocking out computers but not affecting production. Concerns included potential spread to other Qatar Petroleum companies. (2) MEND rebels attacked Shell's offshore Bonga FPSO in Nigeria by boat, though they did not access the computer control room. Total Upstream Nigeria had concerns about potential attacks on their own offshore AKPO FPSO. The document stresses that security management relies on preventing, detecting, and mitigating external threats, and is embedded in facility design, company organization, operational risk management, and emergency response.
The document discusses security risks in the oil and gas industry from cyberattacks and physical attacks. It provides two examples: (1) The "Shamoon" virus attacked Saudi Aramco and RasGas, knocking out computers but not affecting production. Concerns included potential spread to other Qatar Petroleum companies. (2) MEND rebels attacked Shell's offshore Bonga FPSO in Nigeria by boat, though they did not access the computer control room. Total Upstream Nigeria had concerns about potential attacks on their own offshore AKPO FPSO. The document stresses that security management relies on preventing, detecting, and mitigating external threats, and is embedded in facility design, company organization, operational risk management, and emergency response.
The document discusses security risks in the oil and gas industry from cyberattacks and physical attacks. It provides two examples: (1) The "Shamoon" virus attacked Saudi Aramco and RasGas, knocking out computers but not affecting production. Concerns included potential spread to other Qatar Petroleum companies. (2) MEND rebels attacked Shell's offshore Bonga FPSO in Nigeria by boat, though they did not access the computer control room. Total Upstream Nigeria had concerns about potential attacks on their own offshore AKPO FPSO. The document stresses that security management relies on preventing, detecting, and mitigating external threats, and is embedded in facility design, company organization, operational risk management, and emergency response.
Source: CYBERSECURITY EXAMPLE OF “SHAMOON” VIRUS ATTACKS (1/2)
A new virus named Shamoon hit oil giant Saudi Aramco
and Qatar’s RasGas, the second largest LNG producer in the world, said sources at the CIA.
“The virus hit Aramco and Qatari RasGas. In both cases, it
knocked out computer workstations and corporate web sites,” the sources said.
The sources said it did not affect production or cargo
operations. Source: CYBERSECURITY EXAMPLE OF “SHAMOON” VIRUS ATTACKS (2/2)
Main concerns at this time for DOLPHIN ENERGY (DEL) in Qatar
• Understand the overall impact on RASGAS?
• Potential spread to DEL and other Qatar Petroleum
Companies?
• Impact DEL production and export Operations?
• How to protect DEL and its customers, with immediate effect? Source: SECURITY EXAMPLE IN DEEP-OFFSHORE NIGERIA (1/2)
Rebel attack shuts Shell's Bonga FPSO production
June 20, 2008
Shell has shut down production at its Bonga FPSO vessel following an attack by fighters of Nigeria's MEND.
MEND said it launched the attack in open-hulled boats that travelled
through heavy seas to attack the Bonga oil field more than 100 km offshore. But they were not able to enter a computer control room that they had hoped to destroy.
Following the incident, Nigerian President Umaru Yar'Adua directed
his country's armed forces to step up security at all oil facilities in the Niger Delta and to apprehend the perpetrators of the attack, which he called "a national sabotage." SECURITY EXAMPLE IN DEEP-OFFSHORE NIGERIA (2/2)
Main concerns at the time for TOTAL UPSTREAM NIGERIA (TUPNI)
• Would TUPNI be exposed as well, even if 200 km
offshore? • Is AKPO FPSO design robust enough against external attacks? • Can AKPO FPSO, still under construction in Korea, be modified? • How to quickly define and implement the required modifications scope? • How will it impact AKPO Operations organisation and costs? OPERATIONAL SECURITY MANAGEMENT
Security Management relies on Preventing, Detecting, Mitigating the potential impacts of
External Threats (generally of malicious nature) Security Management is embedded in: 1. Facilities Design 2. Companies Organisations à People Awareness & Vigilance à Surveillance Processes à Protection Measures 3. Operational Risks Management 4. Emergency Response Management 5. Crisis Management DISCLAIMER TotalEnergies Professeurs Associés (TPA) and/or any of its Professors, TotalEnergies SA and/or any of its affiliates accept no liability whatsoever for the content of this course/presentation, or for the consequences of any actions taken on the basis of the information provided under such course/presentation. This course/presentation is for information only and is not intended to create a Professor - user relationship.