Assessment of Cybersecurity Risks: Maritime Automated Piloting Process
Pöyhönen, J., & Lehto, M. (2022). Assessment of Cybersecurity Risks: Maritime Automated Piloting Process. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security (17, pp. 262-271). Academic Conferences International Ltd. The proceedings of the 17th international conference on cyber warfare and security. https://doi.org/10.34190/iccws.17.1.18
Date
2022Discipline
Ohjelmisto- ja tietoliikennetekniikkaTietojärjestelmätiedeSoftware and Communications EngineeringInformation Systems ScienceCopyright
© 2022 International Conference on Cyber Warfare and Security
A modern society is a combination of several critical infrastructures, of which international and national maritime transportation systems are essential parts. Digitalization makes it possible to increase levels of autonomy in maritime systems. It also means fully existing cyberenvironments in maritime processes. In cyberenvironments, it is crucial there is trustable information communication between system elements of the process, alongside the usability, reliability, and integrity of systems data in the operating environment. In order to develop maritime autonomy in Finland the Sea4Value / Fairway (S4VF) research program has been developed. At the first stage of the program, the main goal is to create automated fairway piloting feature in the near future. An automated remote piloting process, “ePilotage,” will be a complex system of systems entity. This paper provides a research approach to investigating the cybersecurity risks at the system levels of process. It emphasizes the importation of comprehensive risk assessment to increase the cybersecurity of fairway operations. The findings of the study are located in cybersecurity risks in critical information flows between the main system blocks of the fairway process. The research question is “How can the cybersecurity risks of automated remote fairway operations be evaluated?” The main findings are related to the probabilities of the risks in all levels of process stakeholders’ responsibilities. Risk assessment methodology, that has been described, is based on attack probabilities against probabilities to defend actions of adversarial in use of communication technologies. Risks assessment factors have been identified and the risk assessment tool have been proposed.
...


Publisher
Academic Conferences International LtdParent publication ISBN
978-1-914587-26-9Conference
International Conference on Cyber Warfare and SecurityIs part of publication
ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and SecurityISSN Search the Publication Forum
2048-9870Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/104589101
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Cybersecurity risk assessment subjects in information flows
Pöyhönen, Jouni; Hummelholm, Aarne; Lehto, Martti (Academic Conferences International Ltd, 2022)A modern society includes several critical infrastructures in which digitalization can have positive impacts on the levels of autonomy and efficiency in the use of infrastructure systems. Maritime transportation is an ... -
Cybersecurity Attacks on Software Logic and Error Handling within AIS Implementations : A Systematic Testing of Resilience
Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System ... -
Cyber security challenges in aviation and maritime
Lehto, Martti (Cyberwatch Finland Oy, 2021) -
Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
Shaikh, Faheem Ahmed; Siponen, Mikko (Elsevier, 2023)Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be ... -
Basic Elements of Cyber Security for a Smart Terminal Process
Pöyhönen, Jouni; Simola, Jussi; Lehto, Martti (Academic Conferences International Ltd, 2023)Global maritime transportation and logistics systems are essential parts of critical infrastructures in every society, and a crucial part of maritime logistics processes are seaports. Digitalization helps improve the ...