dc.contributor.author | Simola, Jussi | |
dc.contributor.author | Paavola, Jarkko | |
dc.contributor.author | Satopää, Piia | |
dc.contributor.author | Vanharanta, Jani | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Karjalainen, Mika | |
dc.date.accessioned | 2024-06-27T12:13:01Z | |
dc.date.available | 2024-06-27T12:13:01Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Simola, J., Paavola, J., Satopää, P., & Vanharanta, J. (2024). The Impact of Operational Technology Requirements in Maritime Industries. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 516-525). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2357" target="_blank">https://doi.org/10.34190/eccws.23.1.2357</a> | |
dc.identifier.other | CONVID_220870783 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/96197 | |
dc.description.abstract | The maritime ecosystem and industry require more efficient and coordinated cybersecurity governance. No common cybersecurity mechanism in the maritime sector may steer the whole supply chain management, for example, in the port areas and fairways. Cyberthreat prevention mechanisms in harbor areas and port terminals must be standardized more in the Western world. It has been recognized that understanding cybersecurity of operational technology in the harbor area is based on a more traditional experience of what it requires. The overall security of the maritime ecosystem requires more than random checks of passengers and vehicles and customs functions on cargo and passenger transportation, which are mainly physical security service routines. Traditional physical threats have changed to a combination of threat types. Hybrid threats may prevent everyday harbor activities so that damage can become long-lasting and harm overall business continuity management. It is crucial to prevent cyber threat factors in the maritime domain. The research provides transnational and EU-level cyber security assessments regarding cyber security regulation. The findings determine where to direct and concentrate a focus maritime domain and why it is essential to survey cyber security requirements set for member states to apply. In Finland, this research belongs to the cybersecurity governance of operational technology in the sector connected to the smart energy networks (CSG) research program. The project aims to develop a common cybersecurity governance model for operational technology. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | Proceedings of the 23rd European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European Conference on Cyber Warfare and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | operational technology | |
dc.subject.other | overall situational awareness | |
dc.subject.other | maritime cybersecurity | |
dc.subject.other | governance model | |
dc.title | The Impact of Operational Technology Requirements in Maritime Industries | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202406275039 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 516-525 | |
dc.relation.issn | 2048-8602 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 23 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2024 European Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.relation.grantnumber | 10/31/2022 | |
dc.subject.yso | merenkulku | |
dc.subject.yso | tilannekuva | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | turvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2049 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25187 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7349 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/eccws.23.1.2357 | |
dc.relation.funder | Business Finland | en |
dc.relation.funder | Business Finland | fi |
jyx.fundingprogram | Co-Innovation, BF | en |
jyx.fundingprogram | Co-Innovation, BF | fi |
jyx.fundinginformation | The research was supported by Business Finland (grant number 10/31/2022) and the University of Jyväskylä. | |
dc.type.okm | A4 | |