9 minute read
Lufthansa
The lower the frictional resistance of an aircraft in the air, the lower is the fuel consumption. Using nature as a role model, the aviation industry has been intensively researching ways to reduce aerodynamic drag for many years.
Now Lufthansa Technik and BASF have succeeded in making the breakthrough as part of a joint project. AeroSHARK, a surface film that mimics the fine structure of a shark’s skin, is to be rolled out on Lufthansa Cargo’s entire freighter fleet from the beginning of 2022, making the aircraft more economical and reducing emissions.
The surface structure consisting of riblets measuring around 50 micrometers imitates the properties of sharkskin and therefore optimizes the aerodynamics on flow-related parts of the aircraft.
This means that less fuel is needed overall. For Lufthansa Cargo’s Boeing 777F freighters, Lufthansa Technik estimates a drag reduction of more than one percent. For the entire fleet of ten aircraft, this translates to annual savings of around 3,700 tons of kerosene and just under 11,700 tons of CO2 emissions, which is the equivalent of 48 individual freight flights from Frankfurt to Shanghai.
Environmental concern
“Responsibility for the environment and society is a key strategic topic for us,” says Christina Foerster, Member of the Executive Board of Deutsche Lufthansa AG with responsibility for sustainability. “
This is an excellent example of sustainability in practice, achieved through partnershipbased collaboration and innovative technologies,” says Dr. Markus Kamieth, Member of the Board of Executive Directors, BASF.
“The investments we have
Lufthansa Group and BASF roll out sharkskin technology
From 2022, Lufthansa Cargo will equip all Boeing 777 freighters with AeroSHARK
For the entire fleet of ten aircraft, this translates to annual savings of around 3,700 tons of kerosene and just under 11,700 tons of CO2 emissions
made in rolling out AeroSHARK at Lufthansa Cargo consciously reaffirm our commitment to the United Nation’s sustainable development goal on climate action,” commented Dorothea von Boxberg, Chief Executive Officer, Lufthansa Cargo AG.
In its cooperation with BASF, Lufthansa Technik is responsible for the material specification, approval by the aviation authorities and performance of aircraft modifications carried out as part of regular maintenance layovers.
Approved aviation design
Backed by decades of experience as an approved aviation design organization, the company will obtain a Supplemental Type Certificate (STC) for the 777F from the European Union Aviation Safety Agency (EASA), which is required for operation.
“We have always used our wealth of expertise as a global market leader in technical aircraft services to also contribute to reducing the ecological footprint of our industry. In doing so, we can leverage significant savings potential from all aircraft generations,” explained Dr. Johannes Bussmann, Chief Executive Officer, Lufthansa Technik AG.
“As an expert in surfaces, we implement bespoke solutions for our customers. The innovative sharkskin technology allows us to support Lufthansa in achieving its sustainability goals and in making the aviation industry a little more environmentally friendly,” says Dirk Bremm, head of BASF’s Coatings division and also responsible for functional films in this role.
Join NAFL / FIATA to get connected for networking and business opportunities
Membership open for 2021
TRAINING
Most powerful network in the world for freight and logistics SCHOLARSHIPS FOR DESERVING UAE NATIONALS
Here’s why you should consider being a member: International Benefits:
+ The FIATA member certificate + Use of the Fiata logo + Entry in the FIATA members directory & networking events + Advertising in the FIATA members directory, review and information (FIATA e-Flash) + Special Rates for FIATA publication and articles + Access to secretariat›s assistance + FIATA arbitration code + Use of FIATA documents + FIATA worldwide member connectivity + Talent Connect Worldwide, E-Learning
National Benefits:
+ The NAFL member certificate + Use of the NAFL logo + Free access to networking events + Discountes rates in participating in global and regional conferences + Asssistance in case of legal advocacy + Discounts for cargo/logistic events and exhibition stands + Discount training for NAFL members + Training/Certification for regional/international courses + Insurance at discounted rates (cargo/liability/medical) + Complimentary internship, Skill upgrade and Mentoring & Innovation ideas + Discounted supplier rates for industry products
Be the Industry voice, protect yourself by STC, Insurance and maritime advice, network B2B, B2C
National Association of Freight & Logistics ACCREDITATIONS
the global voice of freight logistics FIATA LEARNING ACADEMY
Securing operational threats in Oil & Gas operations
As industry embraces an accelerated pace of technology usage heightened by the Covid-19, there is also an increase in cyber-attacks observe Niraj Mathur, Managing Director, Security & Privacy, and Manish Laligam, Managing Director and Industry Leader, Energy and Utilities, both from the Protiviti Member Firm for the Middle East Region.
As the world paces towards a phase of digitalization, exacerbated by the pandemic, cyber threats have taken an upward trend.
Whether it is the use of big data and AI to fight malware or the increased dependency on contact less services such as robots or drones, this dependency has opened a Pandora’s Box of notorious cyber-attacks and generated the need for building a resilient environment.
Operational technology (OT) in oil and gas sector has never been looked at from the security lens as it is today. Key enablers that have made OT security at the forefront of the discussion are:
Convergence of IT with OT
The adoption of IOT and modernization of OT systems has led to convergence with IT and removed the silo’s that existed between OT and IT. Emerging technologies such as digital twins, Robotic Process Automation (RPAs) etc. have only expedited the need of the merger. The convergence has thus made OT susceptible to security threats normally targeted at IT systems.
Availability over security Key vulnerabilities
Manish Laligam
Artificial Intelligence (AI), block chain has one common theme i.e., sensitive data that serves as bait to the cyber attackers. The Oil & Gas industry is very often targeted by cyber criminals or hacktivists and the convergence of IT has only made it more vulnerable. Due to the complexity involved in maintaining OT systems, even the basic precautions tend to get ignored. In a recent study, it was found that 71% of sites had outdated OS, 64% did not use encrypt their passwords, 27% of sites had direct internet connections, 66% of sites were not updating patches timely and 54% sites had devices accessibly remotely using standard Manish has over 15 years’ experience protocols, fairly easy to hack. (Source: in business strategy, risk advisory, CyberX 2020 IIOT Report) operations and implementation. The scope of oil and gas industry’s As a business executive, Manish value chain creates numerous has successfully worked on several possibilities of potential entry points for engagements with national and these attacks, ranging from attacks on international oil companies, creating physical infrastructure to disabling of new business opportunities, critical systems. The top 10 vulnerabilities developing nationalized programs in control systems include: and enhancing shareholder value • Inadequate policies and procedures for investors. • Remote access to the control system Reliability and availability of the network without appropriate access control is of prime importance as opposed to • Weak access controls and unauthorized security. Hackers have often found ways to target the communications availability in turn costing millions to the company. • Insufficient tools to detect and report on anomalous or inappropriate activity Dependency on technology • Inadequate design control system network (no defense in-depth) Industrial automation, control and safety systems used • Software used in control systems not adequately tested in the sector are to a large extent digitized. Use of RPA, or maintained
• Use of control system network bandwidth for non-control purposes. • Unauthorized or inappropriate applications or device on control system networks • Inadequate critical support infrastructure (Admin, network management and more) • Vulnerabilities in legacy systems.
How to build cybersecurity consciousness and discipline among employees and contractors
• Protecting individual control system components from exploitation and applying patches and hardening guidelines periodically • Implementing a network topology for the control systems that has multiple layers, with the most critical communications occurring in the most secure and reliable layer. • Timely Detection of security events and incidents. • Effective Response to security events and incidents • Providing logical separation between In November 2020, the UAE the corporate and control system cabinet agreed to establish the networks UAE Cybersecurity Council aimed • Maintaining functionality during at developing a comprehensive adverse conditions cybersecurity strategy to create a safe and Process and Governance: Develop, stronger cyber infrastructure in the UAE. While efforts are made at the national Niraj Mathur deploy and religiously follow an effective SCADA Security Policy and Procedures. strategy level, we need to maintain Niraj is an expert in Security Consulting The essence of such a policy should cover: discipline to give these strategies a field with more than 20 years of • Regulations: Setting the tone right by fruitful outcome. regional and global experience, alignment of security policies with IEC
Oil and gas facilities are critical managing large and complex projects. 62443 and NIST OT guidelines infrastructure assets, producing vital His area of expertise includes security • Purpose: why this policy exists products for economies around the world. strategy, security architecture, security • Scope: what is the context that the Protecting the supply chain and operations, automation and security operations. policy covers? Have security policies therefore is not only of significant Niraj has assisted many large clients extend beyond IT to ensure gaps are importance for the enterprises involved in in the area of compliance, risk adequately covered? manufacturing of these products. It is also management, managed security services • The rules: what can and cannot be for those who depend on and consume and formulating security roadmaps. done? these petroleum products. • Responsibility: who can do what?
A framework for Supervisory Control • References: reference to other policies and Data Acquisition (SCADA) systems is required to already in force identify, evaluate and treat the various types of risks • Revision history: a history of changes, who made targeting these systems. Such a framework can be derived them, when and why by putting in the following 6 parameters: • Enforcement: description of the consequences of acts • WHAT can happen to the system (risks) performed within the system • WHO can do it (agent) • Exceptions: if any, they must be reported in the security • WHY would someone do it (motivation) policy • WHERE these risks can affect (system components • Continuous Monitoring: Perform risk management targeted) periodically. • WHEN can these risks be exploited by agents People: Lastly, to instill cybersecurity consciousness, (component vulnerabilities) an organization should organize employee awareness • HOW can the risks be executed (penetration tools & programs aimed at educating its employees and its methodologies) suppliers on security hygiene. Leadership teams need to There are 3 key verticals that are essential while take the onus for imparting such knowledge to functions considering SCADA Cyber Security in any organization: for instilling a security centered mindset as they continue • Technology – Solutions that aid prevention, detection, to resolve complex business problems. and response such as: As we strive in the digital world that will continue to • Restricting logical access to the control system network change with only more advanced versions and updates, and network activity it is imperative to reflect on our existing modus operandi • Restricting physical access to the control network and and continue to work with the mindset of creating a devices resilient organization.