Näytä suppeat kuvailutiedot

dc.contributor.authorPöyhönen, Jouni
dc.contributor.authorSimola, Jussi
dc.contributor.authorKhan, Irfan
dc.contributor.authorLehto, Martti
dc.contributor.authorWali, Syed
dc.contributor.editorAndreatos, Antonios
dc.contributor.editorDouligeris, Christos
dc.date.accessioned2023-07-10T09:28:46Z
dc.date.available2023-07-10T09:28:46Z
dc.date.issued2023
dc.identifier.citationPöyhönen, J., Simola, J., Khan, I., Lehto, M., & Wali, S. (2023). Assessment of Cyber Security risks : A Smart Terminal Process. In A. Andreatos, & C. Douligeris (Eds.), <i>Proceedings of the 22nd European Conference on Cyber Warfare and Security</i> (22, pp. 366-373). Academic Conferences International. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.22.1.1060" target="_blank">https://doi.org/10.34190/eccws.22.1.1060</a>
dc.identifier.otherCONVID_183758711
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/88352
dc.description.abstractIn Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operation Technologies (OT) systems. In port environment there are parts that are controlled (ICS/OT) from the cyber environment but directly interact with the physical surroundings. These are called Cyber-Physical Systems (CPS). In this environment, the cyber security aspects of the port logistic need to be addressed. In Finland, the Port SMARTER research program has been on the way since 2021. The aim of the program is to create port services within new technology solutions, and that way improve cargo and people flows while improving the experience for all stakeholders. However, this development increase also complicated system dimensions in the use of ports and makes port operations complex systems of systems environment characterized by a conglomeration of interconnected networks and dependencies. This paper describes a practical approach to risk assessment work regarding the SMARTER research case. It provides a comprehensive cyber security investigation approach to port operations at the system level. In risk assessment work, the paper emphasizes the importation of description of probabilities to defend the system element against estimated probabilities of cyber-attacks at all parts of port processes. The findings of the study are related to the comprehensive cyber security architecture of the SMARTER research goals. The following research interests are related to the issue: "How a comprehensive cyber security investigation can be conducted in smart ports operations?” This paper emphasizes cyber security risks assessment work should be covered from services for operation, information flows in and between systems, as well as electricity supplies to achieve holistic risks assessment in the smart terminal process.en
dc.format.extent724
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofProceedings of the 22nd European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European Conference on Cyber Warfare and Security
dc.rightsCC BY-NC-ND 4.0
dc.subject.othermaritime logistic
dc.subject.othersmart terminal process
dc.subject.othercyber security management
dc.subject.otherrisk assessments
dc.titleAssessment of Cyber Security risks : A Smart Terminal Process
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202307104479
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-69-6
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange366-373
dc.relation.issn2048-8602
dc.relation.numberinseries1
dc.relation.volume22
dc.type.versionpublishedVersion
dc.rights.copyright© 2023 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysomerenkulku
dc.subject.ysokyberturvallisuus
dc.subject.ysosatamat
dc.subject.ysoälytekniikka
dc.subject.ysomeriliikenne
dc.subject.ysomerikuljetus
dc.subject.ysoriskinarviointi
dc.subject.ysologistiikka
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p2049
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p11027
jyx.subject.urihttp://www.yso.fi/onto/yso/p27260
jyx.subject.urihttp://www.yso.fi/onto/yso/p2046
jyx.subject.urihttp://www.yso.fi/onto/yso/p2047
jyx.subject.urihttp://www.yso.fi/onto/yso/p6079
jyx.subject.urihttp://www.yso.fi/onto/yso/p9140
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.22.1.1060
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-NC-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-NC-ND 4.0