dc.contributor.author | Simola, Jussi | |
dc.contributor.author | Pöyhönen, Jouni | |
dc.contributor.author | Lehto, Martti | |
dc.contributor.editor | Andreatos, Antonios | |
dc.contributor.editor | Douligeris, Christos | |
dc.date.accessioned | 2023-06-30T09:06:22Z | |
dc.date.available | 2023-06-30T09:06:22Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Simola, J., Pöyhönen, J., & Lehto, M. (2023). Smart Terminal System of Systems’ Cyber Threat Impact Evaluation. In A. Andreatos, & C. Douligeris (Eds.), <i>Proceedings of the 22nd European Conference on Cyber Warfare and Security</i> (pp. 439-449). Academic Conferences International. Proceedings of the European Conference on Cyber Warfare and Security, 22. <a href="https://doi.org/10.34190/eccws.22.1.1070" target="_blank">https://doi.org/10.34190/eccws.22.1.1070</a> | |
dc.identifier.other | CONVID_183733020 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/88153 | |
dc.description.abstract | Systems of system-level thinking is required when the purpose is to develop a coherent understanding of the ecosystem where every user and system requirements are divided into specific parts. The smarter project, as a part of the Sea4value program of DIMECC, aims to develop harbor operations, including passenger and cargo transportation, in a way that port processes will improve, emissions will decrease, and overall security will enhance in smart ports. This paper describes cyber-attack impacts against the Smart terminal system of systems in the cyber realm by utilizing the MITRE ATTACK® framework to map the objectives of threat actors. The Smart Terminal system environment includes ICT, ICS networks and components, communication systems, and port service systems. Internal and external threat sources or actors are hard to divide exactly because of the diversity of the threats. Hybrid threats challenge maritime domain awareness globally. The cyber threat impacts on IT and OT environments are connected to each other because of the use of internal and external networks that impact each other by combining vulnerabilities and threats. Well-working port and terminal operations require not only protected operational systems or sensor systems, but human errors must also be minimized. Objectives of threat actors are presented, categorized, and listed. Threat scenarios illustrate that cyber threats and risks are mainly similar in the maritime global-linked port community and basic hinterland trade. The networked supply chain of the business causes evolving and combined threat scenarios. European and international standards, regulations, policies, recommendations, and, e.g., guidelines by the IMO, set new cyber-threat requirements for port and terminal services and facilities. Therefore, overall security must be considered when cyber-security is the development area. Information exchange in an understandable form is essential for maintaining business continuity. Threat information has to be transferred among stakeholders as well as cyber security codes have to be followed in the port operations of partners that are involved, for example, in operational and system-level actions. Digitalization in smart ports and terminals enhances the capacity to handle cargo and passengers more efficiently, but cyber threats evolve. | en |
dc.format.extent | 724 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | Proceedings of the 22nd European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European Conference on Cyber Warfare and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | cyber ecosystem | |
dc.subject.other | threat impacts | |
dc.subject.other | business continuity | |
dc.subject.other | terminal system of systems | |
dc.subject.other | cybersecurity of ICS | |
dc.subject.other | cybersecurity of ICT | |
dc.title | Smart Terminal System of Systems’ Cyber Threat Impact Evaluation | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202306304299 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.contributor.oppiaine | Engineering | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-914587-69-6 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 439-449 | |
dc.relation.issn | 2048-8602 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2023 European Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | merenkulku | |
dc.subject.yso | kuljetus | |
dc.subject.yso | riskienhallinta | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | satamat | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | riskit | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2049 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7285 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3134 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11027 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11099 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/eccws.22.1.1070 | |
dc.type.okm | A4 | |