Match!

Maritime cybersecurity policy: the scope and impact of evolving technology on international shipping

Published on May 4, 2018
· DOI :10.1080/23738871.2018.1513053
Kimberly Tam4
Estimated H-index: 4
(Plymouth University),
Kevin D. Jones6
Estimated H-index: 6
(Plymouth University)
Abstract
ABSTRACTAs the global maritime industry becomes increasingly dependent on advancing technology, it is important for the world to be more aware of, and understand, the possible scope and impacts cyberattacks can have on international shipping. This article explores the maritime-cyber landscape for security flaws related to the area of maritime operations with an emphasis on the system technology involved, how their vulnerabilities enable attacks with cyber elements, and possible outcomes. As ships become more sophisticated and connected, in order to meet the demands of shipping 90 per cent of the world’s goods, the cyber risks increase. This article aims to analyse compressively the unique nature of maritime cyber and cyber-physical threats to influence maritime cyber policies and improve global fleet security by suggesting adjustments and additions to current codes and policy to cover more comprehensively cyber and cyber-physical risks.
  • References (6)
  • Citations (1)
📖 Papers frequently viewed together
20 Citations
2017
78% of Scinapse members use related papers. After signing in, all features are FREE.
References6
Newest
2 CitationsSource
#1Kimberly Tam (Plymouth University)H-Index: 4
#2Kevin D. Jones (Plymouth University)H-Index: 6
In the current economy, roughly 90% of all world trade is transported by the shipping industry, which is now accelerating its technological growth. While the demand on mariners, ship owners, and the encompassing maritime community for digital advances (particularly towards digitization and automation) has led to efficient shipping operations, maritime cyber-security is a pertinent issue of equal importance. As hackers are becoming increasingly aware of cyber-vulnerabilities within the maritime s...
4 CitationsSource
#1Basil Germond (Lancaster University)H-Index: 6
This article discusses the geopolitical dimension of maritime security, which has been neglected by scholars despite the growing number of studies devoted to a variety of aspects related to maritime security. The first step consists in clarifying the definitions of the two concepts; ‘geopolitics’ and ‘maritime security’. Then the article introduces the geopolitical dimension of maritime security from a conceptual perspective, and then analyses three practical examples of maritime security geo-st...
18 CitationsSource
#1Jacob Maskiewicz (UCSD: University of California, San Diego)H-Index: 2
#2Benjamin Ellis (UCSD: University of California, San Diego)H-Index: 1
Last. Hovav Shacham (UCSD: University of California, San Diego)H-Index: 37
view all 4 authors...
Although many users are aware of the threats that malware pose, users are unaware that malware can infect peripheral devices. Many embedded devices support firmware update capabilities, yet they do not authenticate such updates; this allows adversaries to infect peripherals with malicious firmware. We present a case study of the Logitech G600 mouse, demonstrating attacks on networked systems which are also feasible against airgapped systems. If the target machine is air-gapped, we show that the ...
21 Citations
To prevent and defend networks from the occurrence of attacks, it is highly essential that we have a broad knowledge of existing tools and systems available in the public domain. Based on the behavior and possible impact or severity of damages, attacks are categorized into a number of distinct classes. In this survey, we provide a taxonomy of attack tools in a consistent way for the benefit of network security researchers. This paper also presents a comprehensive and structured survey of existin...
18 CitationsSource
#1Robert BeckmanH-Index: 6
#2Monique PageH-Index: 1
Piracy is both an historical and a contemporary problem. In the past decade it has also proven to be a legal problem. Under international law, many of the attacks against ships that are commonly characterized as piracy actually fall outside of the legal definition of piracy. This has widespread implications for States seeking to undertake law enforcement activities to combat attacks and address maritime security concerns in order to establish a safe maritime environment for shipping and seafarer...
28 CitationsSource
Cited By1
Newest
#1Kimberly Tam (Plymouth University)H-Index: 4
#2Kevin D. Jones (Plymouth University)H-Index: 6
Forensic investigation is an essential response strategy following a cyber-related incident, and forensic readiness is the capability to gather critical digital information and maximize its use as evidence. The effectiveness of this data is highly dependent on the readiness, quality, and trustworthiness of the data itself. Far from a passive post-analysis tool, there have been many instances where an organization has benefited from gathering, and using, digital evidence to improve their cyber-se...
Source
#1Kimberly TamH-Index: 4
#2Kevin D. JonesH-Index: 6
To ensure the safety of ships and ports, groups and individuals, at all levels of the maritime sector, use analysis to identify potential hazards and their outcomes. One of the most relied upon methods is using a risk assessment tool to define and prioritise threats. A disadvantage of most existing assessment frameworks, however, is their inability to update risks dynamically as factors, such as the environment, change. In the maritime sector, a range of dynamic factors is needed to measure risk...
Source
#1Kimberly Tam (Plymouth University)H-Index: 4
#2Kevin D. Jones (Plymouth University)H-Index: 6
In the current economy, roughly 90% of all world trade is transported by the shipping industry, which is now accelerating its technological growth. While the demand on mariners, ship owners, and the encompassing maritime community for digital advances (particularly towards digitization and automation) has led to efficient shipping operations, maritime cyber-security is a pertinent issue of equal importance. As hackers are becoming increasingly aware of cyber-vulnerabilities within the maritime s...
4 CitationsSource