2022
DOI: 10.1007/s10207-022-00638-y
|View full text |Cite
|
Sign up to set email alerts
|

Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth

Abstract: Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways. The novelty of the APS concept influenced the cyber risk paradigm and led to different considerations regarding attack objectives, techniques as well as risk management approaches. The main factor that has led to this is the autoremote operational mode, which refers to autonomous operations and remote supervision and control in case o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 47 publications
0
8
0
Order By: Relevance
“…• Govern Function: There has been a focus on 'Organizational Context' [24][25][26][27][28] and 'Risk Management Strategy' [14,[29][30][31][32][33], with several articles addressing these areas. This indicates progress in the understanding and implementation of cybersecurity within the organizational frameworks and risk management processes of maritime operations.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Govern Function: There has been a focus on 'Organizational Context' [24][25][26][27][28] and 'Risk Management Strategy' [14,[29][30][31][32][33], with several articles addressing these areas. This indicates progress in the understanding and implementation of cybersecurity within the organizational frameworks and risk management processes of maritime operations.…”
Section: Discussionmentioning
confidence: 99%
“…Enhancing information security in maritime freight transport to address cybersecurity threats was proposed by Melnyk et al [31]. A similar focus, specifically on Autonomous Passenger Ships (APS), was discussed by Amro et al [32], who introduced a cyber risk management approach integrating defense-in-depth with threat-informed defense. Additionally, Rajaram et al [33] offered guidelines for cyber risk management, emphasizing the importance of risk assessment, mitigation measures, and a checklist for shipboard operational technology (OT) systems.…”
Section: Risk Management Strategymentioning
confidence: 99%
“…The defense-in-depth model employs multiple layers of security controls to provide comprehensive protection. It assumes that no single security measure is foolproof, so it implements a combination of preventive, detective, and corrective controls at different layers [210], [211]. These layers may include: Perimeter Security: Protecting the boundaries of the civil registration system, such as firewalls, intrusion prevention systems, and access controls [212].…”
Section: Defense-indepth Modelmentioning
confidence: 99%
“…The communication requirements were utilized to define and design a communication architecture for the APS that allows it to communicate with its operational context and support several navigational services such as autonomous navigation and autonomous engine monitoring and control [10]. On the other hand, the cybersecurity requirements in addition to a group of risk analysis processes for the APS as a cyber physical system [8,11] were utilized to define and design a cybersecurity architecture for the APS [7]. Additionally, the testbed capabilities enable the exploration of additional use cases allowing the advancement of cybersecurity research in maritime.…”
Section: Background and Related Workmentioning
confidence: 99%
“…-Methods: Several methods for communication analysis are observed in the literature such as wireless coverage analysis [18] and performance analysis [22]. On the other hand, cybersecurity analysis methods include; among others, risk assessment, adversary emulation, and evaluation of security solutions [7]. Additionally, the cybersecurity analysis approaches; depending on the use case under analysis, can be conducted using black box, grey box, or white box analysis techniques [20].…”
Section: Respectively)mentioning
confidence: 99%