Show simple item record

dc.contributor.authorPöyhönen, Jouni
dc.contributor.authorHummelholm, Aarne
dc.contributor.authorLehto, Martti
dc.contributor.editorEze, Thaddeus
dc.contributor.editorKhan, Nabeel
dc.contributor.editorOnwubiko, Cyril
dc.date.accessioned2022-06-16T11:04:02Z
dc.date.available2022-06-16T11:04:02Z
dc.date.issued2022
dc.identifier.citationPöyhönen, J., Hummelholm, A., & Lehto, M. (2022). Cybersecurity risk assessment subjects in information flows. In T. Eze, N. Khan, & C. Onwubiko (Eds.), <i>ECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security</i> (21, pp. 222-230). Academic Conferences International Ltd. Proceedings of the European conference on cyber warfare and security. <a href="https://doi.org/10.34190/eccws.21.1.263" target="_blank">https://doi.org/10.34190/eccws.21.1.263</a>
dc.identifier.otherCONVID_147096299
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/81817
dc.description.abstractA modern society includes several critical infrastructures in which digitalization can have positive impacts on the levels of autonomy and efficiency in the use of infrastructure systems. Maritime transportation is an example of an infrastructure that currently needs development in the digitalization of its operations and processes. At the same time, maritime processes represent a large-scale cyber environment, thus trustable information distribution between system elements of the processes is needed. Since 2020, the Sea4Value / Fairway (S4VF) research program in Finland has been working to develop maritime digitalization which can lead to autonomy processes in the future. The first stage of the program has led to a demonstration phase of remote fairway piloting. This remote fairway piloting process, “ePilotage,” is a complex system-of-systems entity. In this entity, fairway systems, ship systems and control center systems are the main processes from the operational point of view. Remote pilotage operations need support processes such as vessel traffic service (VTS) and weather forecast services. Situation awareness from other vessels and the stakeholder’s processes are also essential information for the entire piloting operation. In this context, a new concept of information flows at the technical level will be based partly on cloud servers. In this paper, a cybersecurity risk assessment has been carried out at the technical level of information and communication technologies (ICT), and it concerns information transmission between a ship and a cloud server. It describes the most important topics for a comprehensive risk assessment in a specific ship-to-cloud information flow of the fairway process. The findings of the study can be considered good examples of the management of cybersecurity risks in critical information flows between all main system blocks of the fairway process. The research question is as follows: “How can the cybersecurity risks of information flows in a system-of-systems entity be described and evaluated?” The main findings are related to the risks of transmitting information from a ship to a cloud server. The methodology that has been used is based on analyzing the probabilities of cyberattacks occurring in relation to the probabilities to defend against these actions. The main risk assessment topics have been listed.en
dc.format.extent449
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on cyber warfare and security
dc.rightsCC BY-NC-ND 4.0
dc.subject.othermaritime digitalization
dc.subject.othercybersecurity
dc.subject.otherinformation flow
dc.subject.otherrisk topics
dc.titleCybersecurity risk assessment subjects in information flows
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202206163426
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-41-2
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange222-230
dc.relation.issn2048-8602
dc.relation.numberinseries1
dc.relation.volume21
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysokyberturvallisuus
dc.subject.ysodigitalisaatio
dc.subject.ysoinfrastruktuurit
dc.subject.ysotiedonkulku
dc.subject.ysoriskitekijät
dc.subject.ysomerenkulku
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p8692
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p869
jyx.subject.urihttp://www.yso.fi/onto/yso/p13277
jyx.subject.urihttp://www.yso.fi/onto/yso/p2049
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.21.1.263
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0