Näytä suppeat kuvailutiedot

dc.contributor.authorKovanen, Tiina
dc.date.accessioned2021-08-26T07:59:40Z
dc.date.available2021-08-26T07:59:40Z
dc.date.issued2021
dc.identifier.isbn978-951-39-8771-8
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/77501
dc.description.abstractSociety’s vital functions depend on critical infrastructure which covers many elements, from energy production to transportation of goods. This environment is transforming toward an automated and digitalized future. This future creates new information technology environments and networked systems that may include legacy components that were not designed to function securely outside an isolated environment. Furthermore, the dependency between separate systems creates a system of systems that are more complex to design. The development of a digitalized operation of systems will decrease the risk of human error, as decisions are either made by the systems themselves or a human operator receives guidance and alerts. However, removal of the human element introduces new types of threats when, for example, human vision is removed from sensing the operational surroundings. This may delay detection of malfunctions if the corresponding digital sensor is not deployed. Accidents and malfunctions are examples of events that occur incidentally. However, a digitalized environment increases the risk of deliberate malicious cyber-attacks. Therefore, to protect these new environments, understanding the cyber threats and actors is vital. This dissertation discusses this type of development and presents a remote pilotage environment, ePilotage, as a case study in which cyber threats are examined. The research produces a description of the threat actor and scenarios that may be used with the design process and development of the ePilotage environment. As maritime transportation and ports are considered part of the European critical infrastructure, this case study provides knowledge for other critical infrastructures that are transforming from traditional engineering environments to interconnected versions.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherJyväskylän yliopisto
dc.relation.ispartofseriesJYU dissertations
dc.relation.haspart<b>Artikkeli I:</b> Kovanen, T., David, G., & Hämäläinen, T. (2016). Survey: Intrusion Detection Systems in Encrypted Traffic. In <i>O. Galinina, S. Balandin, & Y. Koucheryavy (Eds.), Internet of Things, Smart Spaces, and Next Generation Networks and Systems : 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings (pp. 281-293). Springer International Publishing. Lecture Notes in Computer Science, 9870.</i> DOI: <a href="https://doi.org/10.1007/978-3-319-46301-8_23"target="_blank">10.1007/978-3-319-46301-8_23</a>
dc.relation.haspart<b>Artikkeli II:</b>Kovanen, T., Nuojua, V., & Lehto, M. (2018). Cyber threat landscape in energy sector. In <i>J. Q. Chen, & J. S. Hurley (Eds.), ICCWS 2018 : Proceedings of the 13th International Conference on Cyber Warfare and Security (pp. 353-361). Academic Conferences International.</i>
dc.relation.haspart<b>Artikkeli III:</b> Kemppainen, S., & Kovanen, T. (2018). Honeypot utilization for network intrusion detection. In <i>M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Power and Technology (pp. 249-270). Springer. Intelligent Systems, Control and Automation : Science and Engineering, 93.</i> DOI: <a href="https://doi.org/10.1007/978-3-319-75307-2_15"target="_blank">10.1007/978-3-319-75307-2_15</a>
dc.relation.haspart<b>Artikkeli IV:</b> Pöyhönen, J., Kovanen, T., & Lehto, M. (2021). Basic elements of cyber security for an automated remote piloting fairway system. In <i>ICCWS21 16th International Conference on Cyber Warfare and Security, Tennessee, USA. Academic Conferences International Limited.</i>
dc.relation.haspart<b>Artikkeli V:</b> Kovanen, T., Pöyhönen, J., & Lehto, M. (2021). ePilotage system of systems’ cyber threat impact evaluation. In <i>ICCWS21 16th International Conference on Cyber Warfare and Security, Tennessee, USA. Academic Conferences International Limited.</i>
dc.relation.haspart<b>Artikkeli VI:</b> Hummelholm, A., Pöyhönen, J., Kovanen, T., & Lehto, M. (2021). Cyber security analysis for ships in remote pilotage environment. In <i>ECCWS21 20th European Conference on Cyber Warfare and Security, Chester, UK.</i>
dc.relation.haspart<b>Artikkeli VII:</b> Kovanen, T., Pöyhönen, J., & Lehto, M., (2021). Cyber threat analysis in the remote pilotage system. In <i>ECCWS21 20th European Conference on Cyber Warfare and Security, Chester, UK.</i>
dc.rightsIn Copyright
dc.titleCyber-threat aspects in a complex system-of-systems environment : a case study in remote pilotage
dc.typeDiss.
dc.identifier.urnURN:ISBN:978-951-39-8771-8
dc.relation.issn2489-9003
dc.rights.copyright© The Author & University of Jyväskylä
dc.rights.accesslevelopenAccess
dc.type.publicationdoctoralThesis
dc.format.contentfulltext
dc.rights.urlhttps://rightsstatements.org/page/InC/1.0/
dc.date.digitised


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright