Näytä suppeat kuvailutiedot

dc.contributor.authorPöyhönen, Jouni
dc.contributor.authorLehto, Martti
dc.contributor.editorGriffin, Robert P.
dc.contributor.editorTatarand, Unal
dc.contributor.editorYankson, Benjamin
dc.date.accessioned2022-03-16T12:50:38Z
dc.date.available2022-03-16T12:50:38Z
dc.date.issued2022
dc.identifier.citationPöyhönen, J., & Lehto, M. (2022). Assessment of Cybersecurity Risks: Maritime Automated Piloting Process. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), <i>ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security</i> (17, pp. 262-271). Academic Conferences International Ltd. The proceedings of the 17th international conference on cyber warfare and security. <a href="https://doi.org/10.34190/iccws.17.1.18" target="_blank">https://doi.org/10.34190/iccws.17.1.18</a>
dc.identifier.otherCONVID_104589101
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/80195
dc.description.abstractA modern society is a combination of several critical infrastructures, of which international and national maritime transportation systems are essential parts. Digitalization makes it possible to increase levels of autonomy in maritime systems. It also means fully existing cyberenvironments in maritime processes. In cyberenvironments, it is crucial there is trustable information communication between system elements of the process, alongside the usability, reliability, and integrity of systems data in the operating environment. In order to develop maritime autonomy in Finland the Sea4Value / Fairway (S4VF) research program has been developed. At the first stage of the program, the main goal is to create automated fairway piloting feature in the near future. An automated remote piloting process, “ePilotage,” will be a complex system of systems entity. This paper provides a research approach to investigating the cybersecurity risks at the system levels of process. It emphasizes the importation of comprehensive risk assessment to increase the cybersecurity of fairway operations. The findings of the study are located in cybersecurity risks in critical information flows between the main system blocks of the fairway process. The research question is “How can the cybersecurity risks of automated remote fairway operations be evaluated?” The main findings are related to the probabilities of the risks in all levels of process stakeholders’ responsibilities. Risk assessment methodology, that has been described, is based on attack probabilities against probabilities to defend actions of adversarial in use of communication technologies. Risks assessment factors have been identified and the risk assessment tool have been proposed.en
dc.format.extent645
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security
dc.relation.ispartofseriesThe proceedings of the 17th international conference on cyber warfare and security
dc.rightsCC BY-NC-ND 4.0
dc.subject.othermaritime digitalization
dc.subject.otherautomated piloting
dc.subject.othercybersecurity
dc.subject.otherrisks assessment
dc.subject.otherprobability
dc.titleAssessment of Cybersecurity Risks: Maritime Automated Piloting Process
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202203161896
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-26-9
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange262-271
dc.relation.issn2048-9870
dc.relation.numberinseries1
dc.relation.volume17
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 International Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Cyber Warfare and Security
dc.subject.ysoluotsaus
dc.subject.ysoinfrastruktuurit
dc.subject.ysoautomaattiohjaus
dc.subject.ysoriskinarviointi
dc.subject.ysodigitalisaatio
dc.subject.ysomerenkulku
dc.subject.ysomeriliikenne
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p1802
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p13253
jyx.subject.urihttp://www.yso.fi/onto/yso/p6079
jyx.subject.urihttp://www.yso.fi/onto/yso/p8692
jyx.subject.urihttp://www.yso.fi/onto/yso/p2049
jyx.subject.urihttp://www.yso.fi/onto/yso/p2046
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/iccws.17.1.18
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-NC-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-NC-ND 4.0