Skip to main content

2020 | OriginalPaper | Buchkapitel

8. Cybersecurity at Sea

verfasst von : Polychronis Kapalidis

Erschienen in: Global Challenges in Maritime Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Over the past few years there has been growing interest in the issues of cybersecurity and maritime security, but far too little attention has been paid to the combination of the two security problems; and yet there are clear and critical points of intersection. The dependence of the international maritime community on cyberspace is substantially increasing and, thus, forges new and unexpected vulnerabilities. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The maritime community, consisting of maritime transport, port operations, critical offshore infrastructure and digital economic transactions is heavily structured around online systems. The chapter assesses the risks and vulnerabilities of the international maritime sector in regard to cybersecurity and identifies potential tools and international measures to enhance cyber resilience in the wider maritime security field. The chapter contributes to a deeper understanding of the wider dynamics of these implications, providing the basic principles, comprehension and framework in order to apply cyber resilience together with situational awareness, business continuity plan and risk management.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
These events will be analysed later on. We refer to the ransomware attack at NHS and the “Petya” attack respectively.
 
2
These include but are not limited to Maritime Security Centre - Horn of Africa (MSCHOA), United Kingdom Maritime Trade Operations (UKMTO) and the NATO Shipping Centre (NSC).
 
3
USCG Cyber Strategy 2015. The UK Maritime Strategy identifies cyber-attacks at the maritime domain as one of the five Maritime Security Risks (UK Government 2014, p. 19).
 
4
TMSA 3 programme provides companies with a means to improve and measure their own safety management systems. For further details see www.​ocimf.​org/​sire/​about-tmsa.​aspx.​
 
5
For further details see IMO (2016).
 
6
Although common sense, research conducted by Chatham House, a UK-based think tank, has indicated that such response plans are not in place in most of the world’s shipping companies, at the time of writing if this chapter (Autumn 2018).
 
7
These four case studies where part of an Industrial e-paper that was published by Knect365, where the writer was asked to comment and advise. Further details can be found on Knect365 (2018).
 
8
In general, ship systems are distinguished in two categories, the IT and OT. The first category includes IT System Management, Surveillance within the ship, Maintenance monitoring, crew and passenger entertainment and any other system that offers support to a ships’ operation cycle. OT systems are the core systems that control the ship’s daily operations and include power generation and distribution, propulsion, navigation and steering, ship-to-ship and ship-to-shore, along with emergency and distress communications and so forth. These are the systems that are first on the priority list regarding cybersecurity for ships. For further details see http://​www.​ics-shipping.​org/​docs/​default-source/​resources/​safety-security-and-operations/​guidelines-on-cyber-security-onboard-ships.​pdf?​sfvrsn=​16
 
Literatur
Zurück zum Zitat Azeem A, Wakefield A, Button M (2013) Addressing the weakest link: implementing converged security. Secur J 26(3):236–248CrossRef Azeem A, Wakefield A, Button M (2013) Addressing the weakest link: implementing converged security. Secur J 26(3):236–248CrossRef
Zurück zum Zitat BIMCO (2018) The guidelines on cybersecurity onboard ships. BIMCO et al, London BIMCO (2018) The guidelines on cybersecurity onboard ships. BIMCO et al, London
Zurück zum Zitat Bishop M (2003) What is computer security? IEEE Secur Priv 1(99):67–69CrossRef Bishop M (2003) What is computer security? IEEE Secur Priv 1(99):67–69CrossRef
Zurück zum Zitat EU (2014) EU maritime security strategy. European Commission, Brussels EU (2014) EU maritime security strategy. European Commission, Brussels
Zurück zum Zitat UK Government (2014) The UK national strategy for maritime security. OGL, London UK Government (2014) The UK national strategy for maritime security. OGL, London
Zurück zum Zitat IMO (2016) Interim guidelines on maritime cyber risk management. IMO, London IMO (2016) Interim guidelines on maritime cyber risk management. IMO, London
Zurück zum Zitat Knect365 (2018) Shipping 2030: collaboration in the shipping industry: innovation and technology. Informa Publishing, London Knect365 (2018) Shipping 2030: collaboration in the shipping industry: innovation and technology. Informa Publishing, London
Zurück zum Zitat NISTIR (2013) NISTIR 7298: glossary of key information security terms, revision 2. Washington, DC, NIST NISTIR (2013) NISTIR 7298: glossary of key information security terms, revision 2. Washington, DC, NIST
Zurück zum Zitat Rossouw VS, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97–102CrossRef Rossouw VS, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97–102CrossRef
Zurück zum Zitat Weber R, Weber R (2010) Internet of things: legal perspectives. Springer, BerlinCrossRef Weber R, Weber R (2010) Internet of things: legal perspectives. Springer, BerlinCrossRef
Zurück zum Zitat WSJ (2018) Cocaine’s new gateway to Europe: busy Belgian port. s.n, Antwerp WSJ (2018) Cocaine’s new gateway to Europe: busy Belgian port. s.n, Antwerp
Zurück zum Zitat Institute of Engineering and Technology (2017) Code of practice: cyber security for ships. IET, London Institute of Engineering and Technology (2017) Code of practice: cyber security for ships. IET, London
Zurück zum Zitat Singer PW, Friedman A (2014) Cybersecurity and cyberwar: what everyone needs to know. Oxford University Press, Oxford Singer PW, Friedman A (2014) Cybersecurity and cyberwar: what everyone needs to know. Oxford University Press, Oxford
Metadaten
Titel
Cybersecurity at Sea
verfasst von
Polychronis Kapalidis
Copyright-Jahr
2020
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-34630-0_8