
The Library
A vulnerability centric system of systems analysis on the maritime transportation sector most valuable assets : recommendations for port facilities and ships
Tools
Kapalidis, Chronis, Karamperidis, Stavros, Watson, Tim and Koligiannis, Georgios (2022) A vulnerability centric system of systems analysis on the maritime transportation sector most valuable assets : recommendations for port facilities and ships. Journal of Marine Science and Engineering, 10 (10). 1486. doi:10.3390/jmse10101486 ISSN 2077-1312.
|
PDF
jmse-10-01486-v2.pdf - Published Version - Requires a PDF viewer. Available under License Creative Commons Attribution 4.0. Download (2260Kb) | Preview |
Official URL: https://doi.org/10.3390/jmse10101486
Abstract
The maritime sector is a vital component of the global economy. Its international nature supersedes state boundaries and any disruption in its operations could have consequent and collateral global effects, affecting the socio-economic wellbeing of regions, states and peoples. The increasing adoption of digitalisation in the sector, primarily increases efficiency, minimize cost and maximise benefit, while improving safety, simultaneously introduces a new cyber threat landscape. The attack surface has broadened further due to the COVID-19 pandemic, as recent, high-profile cyber attacks to shipping companies have indicated. Cybersecurity is not limited to technology but involves people and business processes. Hence, to mitigate the security risk introduced by cyber threat actors, the industry, like any other, should initially focus on identifying its most critical assets and then adopt risk mitigation measures, spreading from legislative initiatives to company-specific technology solutions. Industry-led initiatives should promote the adoption of cyber-related policies and mechanisms that focus on business continuity. It should be the role of international bodies, classification societies and national authorities to ensure compliance and full implementation of these measures. This paper adopts a System of Systems Analysis to carry out a vulnerability assessment of port and ship ecosystem, while providing insights on the role of the aforementioned entities. Our analysis decomposes the industry’s major assets; ports and ships, to specific subcomponents which are used as the basis of the vulnerability assessment. According to our findings, this approach highlights that the majority of these subcomponents; ports and ships, are increasingly vulnerable to cyber attacks.
Item Type: | Journal Article | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | H Social Sciences > HE Transportation and Communications Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software |
||||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||||||||||
SWORD Depositor: | Library Publications Router | ||||||||||||
Library of Congress Subject Headings (LCSH): | Shipping -- Security measures, Harbors -- Security measures, Computer security, Cyberterrorism | ||||||||||||
Journal or Publication Title: | Journal of Marine Science and Engineering | ||||||||||||
Publisher: | MDPI | ||||||||||||
ISSN: | 2077-1312 | ||||||||||||
Official Date: | 13 October 2022 | ||||||||||||
Dates: |
|
||||||||||||
Volume: | 10 | ||||||||||||
Number: | 10 | ||||||||||||
Article Number: | 1486 | ||||||||||||
DOI: | 10.3390/jmse10101486 | ||||||||||||
Status: | Peer Reviewed | ||||||||||||
Publication Status: | Published | ||||||||||||
Reuse Statement (publisher, data, author rights): | ** Article version: VoR ** From MDPI via Jisc Publications Router ** History: received 28-06-2022; collection 10-2022; accepted 11-10-2022; epub 13-10-2022. ** Licence for VoR version of this article: https://creativecommons.org/licenses/by/4.0/ ** Acknowledgements: Acknowledgments: The authors would like to thank the Stavros Niarchos Foundation for their funding and support of the main author’s fellowship at Chatham House. We would also like to thank the Queen Elisabeth II Academy for Leadership in International Affairs and the International Security Department staff for their guidance, contributions, and trust in this work. The authors would also like to express their gratitude to all the people who contributed one way or another to the publication of this paper. Particular thanks go to the people who were interviewed for this project, along with all the participants who attended the roundtable discussions. The valuable feedback received from anonymous peer reviewers was incorporated, as far as possible, into the paper. | ||||||||||||
Access rights to Published version: | Open Access (Creative Commons) | ||||||||||||
Date of first compliant deposit: | 24 November 2022 | ||||||||||||
Date of first compliant Open Access: | 24 November 2022 | ||||||||||||
RIOXX Funder/Project Grant: |
|
||||||||||||
Related URLs: | |||||||||||||
Contributors: |
|
Request changes or add full text files to a record
Repository staff actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year