Show simple item record

dc.contributor.authorSimola, Jussi
dc.contributor.authorPöyhönen, Jouni
dc.contributor.authorLehto, Martti
dc.contributor.editorAndreatos, Antonios
dc.contributor.editorDouligeris, Christos
dc.date.accessioned2023-06-30T09:06:22Z
dc.date.available2023-06-30T09:06:22Z
dc.date.issued2023
dc.identifier.citationSimola, J., Pöyhönen, J., & Lehto, M. (2023). Smart Terminal System of Systems’ Cyber Threat Impact Evaluation. In A. Andreatos, & C. Douligeris (Eds.), <i>Proceedings of the 22nd European Conference on Cyber Warfare and Security</i> (pp. 439-449). Academic Conferences International. Proceedings of the European Conference on Cyber Warfare and Security, 22. <a href="https://doi.org/10.34190/eccws.22.1.1070" target="_blank">https://doi.org/10.34190/eccws.22.1.1070</a>
dc.identifier.otherCONVID_183733020
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/88153
dc.description.abstractSystems of system-level thinking is required when the purpose is to develop a coherent understanding of the ecosystem where every user and system requirements are divided into specific parts. The smarter project, as a part of the Sea4value program of DIMECC, aims to develop harbor operations, including passenger and cargo transportation, in a way that port processes will improve, emissions will decrease, and overall security will enhance in smart ports. This paper describes cyber-attack impacts against the Smart terminal system of systems in the cyber realm by utilizing the MITRE ATTACK® framework to map the objectives of threat actors. The Smart Terminal system environment includes ICT, ICS networks and components, communication systems, and port service systems. Internal and external threat sources or actors are hard to divide exactly because of the diversity of the threats. Hybrid threats challenge maritime domain awareness globally. The cyber threat impacts on IT and OT environments are connected to each other because of the use of internal and external networks that impact each other by combining vulnerabilities and threats. Well-working port and terminal operations require not only protected operational systems or sensor systems, but human errors must also be minimized. Objectives of threat actors are presented, categorized, and listed. Threat scenarios illustrate that cyber threats and risks are mainly similar in the maritime global-linked port community and basic hinterland trade. The networked supply chain of the business causes evolving and combined threat scenarios. European and international standards, regulations, policies, recommendations, and, e.g., guidelines by the IMO, set new cyber-threat requirements for port and terminal services and facilities. Therefore, overall security must be considered when cyber-security is the development area. Information exchange in an understandable form is essential for maintaining business continuity. Threat information has to be transferred among stakeholders as well as cyber security codes have to be followed in the port operations of partners that are involved, for example, in operational and system-level actions. Digitalization in smart ports and terminals enhances the capacity to handle cargo and passengers more efficiently, but cyber threats evolve.en
dc.format.extent724
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofProceedings of the 22nd European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European Conference on Cyber Warfare and Security
dc.rightsCC BY-NC-ND 4.0
dc.subject.othercyber ecosystem
dc.subject.otherthreat impacts
dc.subject.otherbusiness continuity
dc.subject.otherterminal system of systems
dc.subject.othercybersecurity of ICS
dc.subject.othercybersecurity of ICT
dc.titleSmart Terminal System of Systems’ Cyber Threat Impact Evaluation
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202306304299
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineInformation Systems Scienceen
dc.contributor.oppiaineEngineeringen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-69-6
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange439-449
dc.relation.issn2048-8602
dc.type.versionpublishedVersion
dc.rights.copyright© 2023 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysokyberturvallisuus
dc.subject.ysomerenkulku
dc.subject.ysokuljetus
dc.subject.ysoriskienhallinta
dc.subject.ysotietojärjestelmät
dc.subject.ysosatamat
dc.subject.ysoverkkohyökkäykset
dc.subject.ysoriskit
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p2049
jyx.subject.urihttp://www.yso.fi/onto/yso/p7285
jyx.subject.urihttp://www.yso.fi/onto/yso/p3134
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p11027
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p11099
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.22.1.1070
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0