dc.contributor.author | Simola, Jussi | |
dc.contributor.author | Pöyhönen, Jouni | |
dc.contributor.author | Martti, Lehto | |
dc.contributor.editor | Wilson, Richard L. | |
dc.contributor.editor | Curran, Brendan | |
dc.date.accessioned | 2023-03-06T06:55:08Z | |
dc.date.available | 2023-03-06T06:55:08Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Simola, J., Pöyhönen, J., & Martti, L. (2023). Cyber Threat Analysis in Smart Terminal Systems. In R. L. Wilson, & B. Curran (Eds.), <i>ICCWS 2023 : Proceedings of the 18th International Conference on Cyber Warfare and Security</i> (pp. 369-378). Academic Conferences International Ltd. The Proceedings of the ... International Conference on Cyber Warfare and Security, 18. <a href="https://doi.org/10.34190/iccws.18.1.931" target="_blank">https://doi.org/10.34190/iccws.18.1.931</a> | |
dc.identifier.other | CONVID_177152289 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85751 | |
dc.description.abstract | Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have changed to a combination of threat types. While developing cyber or physical threats may evolve into hybrid threats, it may prevent everyday harbor activities so that damage can become long-lasting and harm business continuity management. Therefore, it is essential to analyze cyber threat factors in Smart Terminal Systems. The research provides cyber threat and vulnerability analysis and the main attack vectors in the Smart Terminal systems. This research belongs in Finland to the maritime Sea4Value (S4VF) research program that includes Smart Terminals (SMARTER) project for harbor’s digitalization. | en |
dc.format.extent | 580 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | ICCWS 2023 : Proceedings of the 18th International Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | The Proceedings of the ... International Conference on Cyber Warfare and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | maritime logistics | |
dc.subject.other | smart terminal process | |
dc.subject.other | cyber security analysis | |
dc.subject.other | threats | |
dc.title | Cyber Threat Analysis in Smart Terminal Systems | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202303062010 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.contributor.oppiaine | Engineering | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-914587-61-0 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 369-378 | |
dc.relation.issn | 2048-9870 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2023 Jussi Simola, Jouni Pöyhönen, Lehto Martti | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | International Conference on Cyber Warfare and Security | |
dc.subject.yso | terminaalit | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | merenkulku | |
dc.subject.yso | uhat | |
dc.subject.yso | satamat | |
dc.subject.yso | älytekniikka | |
dc.subject.yso | logistiikka | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3310 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2049 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21206 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11027 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27260 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p9140 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/iccws.18.1.931 | |
dc.type.okm | A4 | |