Forensic Readiness within the Maritime Sector

Published on Jun 3, 2019
· DOI :10.1109/CYBERSA.2019.8899642
Kimberly Tam6
Estimated H-index: 6
(Plymouth University),
Kevin D. Jones7
Estimated H-index: 7
(Plymouth University)
Forensic investigation is an essential response strategy following a cyber-related incident, and forensic readiness is the capability to gather critical digital information and maximize its use as evidence. The effectiveness of this data is highly dependent on the readiness, quality, and trustworthiness of the data itself. Far from a passive post-analysis tool, there have been many instances where an organization has benefited from gathering, and using, digital evidence to improve their cyber-security and mitigate future incidents. This article examines the forensic readiness of the maritime sector, a core component of global trade and a unique combination of information/operational technology and people, to understand its investigation and mitigation capabilities. Once the readiness of maritime forensic investigation has been better understood, by comparing it to other sectors and using risk scenarios, this paper proposes actions toward improvement. These steps are built from established attempts to increase investigation capabilities and improve maritime cyber-security, but address the maritime sector specifically.
  • References (14)
  • Citations (0)
📖 Papers frequently viewed together
1 Citations
4 Authors (Olivier Jacq, ..., Jacques Simonin)
78% of Scinapse members use related papers. After signing in, all features are FREE.
#1Kimberly Tam (Plymouth University)H-Index: 6
#2Kevin D. Jones (Plymouth University)H-Index: 7
In the current economy, roughly 90% of all world trade is transported by the shipping industry, which is now accelerating its technological growth. While the demand on mariners, ship owners, and the encompassing maritime community for digital advances (particularly towards digitization and automation) has led to efficient shipping operations, maritime cyber-security is a pertinent issue of equal importance. As hackers are becoming increasingly aware of cyber-vulnerabilities within the maritime s...
4 CitationsSource
#1Sylvain BouyonH-Index: 1
#2Simon KrauseH-Index: 1
In the midst of several large cyberattacks in 2017, the European Commission adopted its multi-sector cybersecurity package in September of that same year. Whereas this initiative can be expected to contribute to strengthening the cyber-resilience and response of EU financial firms, several policy issues and unanswered questions remain. In order to analyse the issues that are considered to be relevant to financial fields (retail banking, corporate banking, capital markets, financial infrastructur...
1 Citations
#1Kimberly Tam (Plymouth University)H-Index: 6
#2Kevin D. Jones (Plymouth University)H-Index: 7
As a $183.3 Billion industry controlling 90 % of all world trade, the shipping community is continuously looking for methods to increase profits while still considering human and environmental safety. As a result of developing technologies and policy that make autonomy a feasible solution, at least three separate organizations are aiming to produce and sail their first autonomous ships by 2020. Thus it is essential to begin assessing their cyber-risk profiles in order to rank and mitigate any vu...
7 CitationsSource
#1Kimberly Tam (Plymouth University)H-Index: 6
#2Kevin D. Jones (Plymouth University)H-Index: 7
ABSTRACTAs the global maritime industry becomes increasingly dependent on advancing technology, it is important for the world to be more aware of, and understand, the possible scope and impacts cyberattacks can have on international shipping. This article explores the maritime-cyber landscape for security flaws related to the area of maritime operations with an emphasis on the system technology involved, how their vulnerabilities enable attacks with cyber elements, and possible outcomes. As ship...
1 CitationsSource
#1Yulia Cherdantseva (Cardiff University)H-Index: 6
#2Peter Burnap (Cardiff University)H-Index: 21
Last. Kristan Stoddart (Aberystwyth University)H-Index: 5
view all 7 authors...
This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We describe the essence of the methods and then analyse them in terms of aim; application domain; the stages of risk management addressed; key risk management concepts covered; impact measurement; sources of probabilistic data; evaluation...
136 CitationsSource
3 Citations
#1Keith A. StoufferH-Index: 10
#2Joseph A. Falco (NIST: National Institute of Standards and Technology)H-Index: 10
Last. Karen A. ScarfoneH-Index: 28
view all 3 authors...
This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provid...
588 CitationsSource
#1Kevin D. Jones (PSU: Plymouth State University)H-Index: 7
#2Kimberly TamH-Index: 6
Last. Maria Papadaki (PSU: Plymouth State University)H-Index: 15
view all 3 authors...
In an increasingly connected and technologically dependent world, new areas of vulnerability are emerging. This article explores the unique challenges of maritime cyber security in order to better understand the issues with securing vessels at sea, together with the shore based infrastructure supporting this industry. In particular, this article explores the cyber-attacks possible on maritime-related systems for navigation, propulsion, and cargo-related functions. The authors illustrate the pote...
6 CitationsSource
#1Eoghan CaseyH-Index: 17
Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills. The ...
336 Citations
Jun 13, 2010 in DAC (Design Automation Conference)
#1Ragunathan Rajkumar (CMU: Carnegie Mellon University)H-Index: 59
#2Insup Lee (UPenn: University of Pennsylvania)H-Index: 53
Last. John A. Stankovic (UVA: University of Virginia)H-Index: 93
view all 4 authors...
Cyber-physical systems (CPS) are physical and engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing and communication core. Just as the internet transformed how humans interact with one another, cyber-physical systems will transform how we interact with the physical world around us. Many grand challenges await in the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defense, aerospace and buildings. T...
946 CitationsSource
Cited By0