PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cyber threats for present and future commercial shipping

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cyber-attacks are extremely dangerous for all operations relaying upon it-technologies. Today shipping businesses cannot operated without processing large amounts of information. Four biggest shipping companies suffered break-down in their operations after they were struck by malware. International Maritime Organization also was struck by cyber-attack which took its website down. Maritime community noticed rise in cyber-attacks on virtually all computer-based systems on board of vessels. For manned vessels risks to safety of navigation are mitigated by presence of crew on board but remain financial and reputational losses. Introduction of remotely controlled and fully autonomous unmanned vessels will increase seriousness of threats. Cyber-attack may severely hamper ship’s operability or even lead to complete loss of control. International community is developing several countermeasures to protect commercial shipping presently and in future.
Twórcy
autor
  • Gdynia Maritime University, Gdynia, Poland
Bibliografia
  • [1] AGCS. Safety and Shipping Review 2022.p.9. Munich 2022.
  • [2] Balduzzi M., Pasta A., Wilhoit K., A Security Evaluationof AIS Automated Identification System, https://www.madlab.it/papers/ais_acsac14.pdf.
  • [3]] Direnzo III J., Drumhiller N. K., Roberts F. S., Issues inMaritime Cyber Security, p.20,23. Westphalia Press,Washington D.C. 2017.
  • [4] Finnish National Emergency Supply Organization, The Maritime Transport Pool, Maritime Cybersecurity‐Best Practices for Vessels, p.5, Helsinki 2021.
  • [5] IALA Guideline G1117 VHF Data Exchange System (VDES) Overview Edition 3.0, electronic edition, Saint Germain en Laye, 2022.
  • [6] IMO, International Convention of Safety of Life at Sea (1974), Electronic Edition 2020, London.
  • [7] IMO, Resolution MSC.252(83) Adoption of the Revised Performance Standards for Integrated Navigation Systems (INS), London, 2007.
  • [8] INTERTANKO, Jamming and spoofing of Global Navigational Satellite System (GPS), p.5,14, London 2019.
  • [9] Lind M., Michaelides M., Ward R., Watson R. T., Maritime Informatics, p.43, Springer, Cham 2021.
  • [10 National Institute of Standards and Technology, US Department of Commerce, Guide to Industrial Control Systems (ICS) Security, p. 2‐16,2‐17, Gaithersburg, 2015.
  • [11] Pawelski J., (2022) Barriers impending introduction of autonomous vessels. Scientific Journals of the Maritime University of Szczecin, Zeszyty Naukowe Akademii Morskiej w Szczecinie 72 (144), p.39, Szczecin 2022.
  • [12] https://blog.geogarage.com/2017/12/nightmarescenarioship‐critical.html,accessed 10.02.2023.
  • [13] https://rntfnd.org/2017/11/25/hackers‐took‐full‐controlof/container‐ships‐navigation‐systems‐for‐10‐hours‐ihsfairplay/accessed 02.02.2023.
  • [14] https://vesselautomation.com/maritime‐cyberattacks/,accessed 10.02.2023.
  • [15] https://www.bimco.org/contracts‐and‐clauses/bimcoclauses/current/cyber‐security‐clause‐2019,accessed20.01.2023.
  • [16] https://www.blackhat.com/docs/asia‐14/materials/Balduzzi/Asia‐14‐Balduzzi‐AIS‐Exposed‐Understanding‐Vulnerabilities‐And‐Attacks.pdf,accessed 21.01.2023.
  • [17] https://www.csoonline.com/article/3218104/stuxnetexplained‐the‐first‐known‐cyberweapon.html,accessed02.02.2023.
  • [18] https://www.cybersecurity‐review.com/news‐july‐2020/maritime‐cyber‐attacks‐increase‐by‐900‐in‐threeyears/accessed 04.02.2023.
  • [19] https://www.darkreading.com/attacks‐breaches/plcspossessed‐researchers‐create‐undetectablerootkit,accessed 17.02.2023.
  • [20] https://www.darkreading.com/threatintelligence/stealthy‐new‐plc‐hack‐jumps‐the‐airgap,accessed 11.02.2023.
  • [21] https://www.darkreading.com/vulnerabilitiesthreats/hijacking‐a‐plc‐using‐its‐own‐networkfeatures,accessed 09.02.2023.
  • [22] https://www.defenseone.com/technology/2015/08/hacker‐cracks‐satellite‐communicationsnetwork/118915/,accessed 17.02.2023.
  • [23] https://gcaptain.com/inmarsat‐shipboardcommunication‐platform‐found‐vulnerable‐tohacking/accessed 08.02.2023.
  • [24] https://gcaptain.com/international‐maritimeorganization‐hit‐by‐cyber‐attack/,accessed 17.02.2023.
  • [25] https://www.gpsworld.com/spoofing‐in‐the‐black‐seawhat‐really‐happened/,accessed 12.02.2023.
  • [26] https://www.iala‐aism.org/e‐bulletin/enhanced‐radarpositioning‐system/,accessed 15.02.2023.
  • [27] https://www.ibm.com/blogs/internet‐of‐things/what‐isthe‐iot/,accessed 15.02.2023.
  • [28] https://www.inmarsat.com/en/news/latestnews/maritime/2022/fleet‐secure‐cybercrime‐unifiedthreat‐management.html,accessed 14.02.2023.
  • [29] https://www.iua.co.uk/IUA_Member/Clauses/eLibrary/Clauses_Search.aspx?CAT=PAC,accessed 08.02.2023.
  • [30] https://www.madlab.it/papers/ais_acsac14.pdf,accessed10.02.2023.
  • [31] https://www.missionsecure.com/resources/comprehensive‐guide‐to‐maritime‐security‐ebook, accessed 15.022023.
  • [32] https://www.otorio.com/blog/maritime‐port‐cybersecurity‐the‐achilles‐heel‐of‐the‐globaleconomy/,accessed 17.02.2023.
  • [33] https://www.pentestpartners.com/securityblog/hacking‐tracking‐stealing‐and‐sinkingships/,accessed 14.02.2023.
  • [34] https://www.techopedia.com/iiot‐vs‐iot‐the‐biggerrisks‐of‐the‐industrial‐internet‐ofthings/2/34394#:~:text=The%20defining%20difference%20between%20Internet%20of%20Things%20%28IoT%29,as%20manufacturing%2C%20supply%20chain%20monitoring%20and%20management%20systems., accessed07.02.2023.
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-91b89701-a5b2-4782-8701-7e07b5e0487b
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.