Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In recent years, various types of commerce including transport have suffered significant damage and costs due to cyber-attacks. The geographic scope of freight transportation has no boundaries, attacks can be launched almost anywhere there is an Internet connection. Therefore, there is no immunity from the failure of computer systems and information of delivery processes in the networks of organizations and companies engaged in maritime transportation. In addition, while the consequences of cyber-attacks on major shipping lines and ports, as well as the digital systems of logistics companies, can be comprehensively analyzed, the vulnerability of ships remains insufficiently studied. This paper offers an analysis of the risks in the field of maritime freight transport and the main factors of influence such as digitization on the safety of the transport process. The basic threats to the information system of the ship are defined and the techniques of risk analysis for the ship information security is proposed.
Rocznik
Tom
Strony
717--722
Opis fizyczny
Bibliogr. 33 poz., rys., tab.
Twórcy
autor
- Odesa National Maritime University, Odessa, Ukraine
autor
- Odesa National Maritime University, Odessa, Ukraine
autor
- National University “Odesa Maritime Academy”, Odesa, Ukraine
autor
- Odesa National Maritime University, Odesa, Ukraine
autor
- Odesa National Maritime University, Odesa, Ukraine
autor
- Odesa National Maritime University, Odesa, Ukraine
autor
- Admiral Makarov National University of Shipbuilding, Mykolaiv, Ukraine
Bibliografia
- [1] S. Reidy, “The basics that everyone must know about cargo damage”, Arviem (2020). Available at: https://arviem.com/the-basics-that-everyone-must-know-about-cargo-damage.
- [2] Information technology. Methods of ensuring security. Information security management systems. Requirements ISO/IEC 27001, Standartinform (2006), 54 p.
- [3] Risk management guide for information technology systems. Recommendations of the National Institute of Standards and Technology, NIST 800-30 (2002), 56 p.
- [4] E. Legchekova & O. Titov, “The method of information security risk calculation. Gomel”, BTEU (2017).
- [5] O. Melnyk, S. Onyshchenko, O. Onishchenko, O. Lohinov & V. Ocheretna, “Integral approach to vulnerability assessment of ship’s critical equipment and systems”, Transactions on Maritime Science (2023), 12(1).
- [6] ISO/IEC 27035, Information technology, Security techniques, Information security incident management, (2011) 78 p.
- [7] Information security standard BS ISO/IEC 27001:2005 (BS 7799-2:2005) Information security management.
- [8] O. Onishchenko, K. Shumilova, S. Volyanskyy, Y. Volyanskaya & Y. Volianskyi, “Ensuring Cyber Resilience of Ship Information Systems”, TransNav, (2022) 16 (1), pp. 43 - 50.
- [9] Common cyber-security vulnerabilities in ships, Hatteland technology. Available at: https://www.hattelandtechnology.com/blog/cyber-security-vulnerabilities-on-board-ships.
- [10] The Guidelines on Cyber Security Onboard Ships (BIMCO). The Guidelines on Cyber Security onboard Ships, Version 4.
- [11] Keeping cargo moving: Maritime Cybersecurity, Security Practitioner Insights. Webinar series (2016).
- [12] Y.C. Lee, S.K. Park, W.K. Lee, & J. Kang, “Improving cyber security awareness in maritime transport: A way forward”, Journal of the Korean Society of Marine Engineering (2017), 41. pp. 738-745.
- [13] P.S. Seemma & Sundaresan, Nandhini & M, Sowmiya, “Overview of Cyber Security”, IJARCCE (2018), 7, pp. 125-128.
- [14] G. Srikanth & S. Kandukuri, “CyberSecurity Trends in Information Technology and Emerging Future Threats”, Conference: Recent Trends in Computer Science and Information Technology”, (ICRCSIT–2020).
- [15] V. Filinovych, & Z. Hu, “Aviation and the Cybersecurity Threats”, Conference: International Conference on Business, Accounting, Management, Banking, Economic Security and Legal Regulation Research (BAMBEL 2021).
- 16] A. Sharma, A. Tyagi, & M. Bhardwaj, “Analysis of techniques and attacking pattern in cyber security approach: A survey”, International journal of health sciences (2022), pp. 13779-13798.
- [17] U. Singh & P. Singh, “Managing Cyber Security. Journal of Management and Service Science”, (JMSS), (2022), 2. pp. 1-10.
- [18] T. Lamba & S. Kandwal, “Global Outlook of Cyber Security”, Third International Conference on Information Management and Machine Intelligence (2022), pp. 269-276.
- [19] M. Lehto, “Cyber Security in Aviation, Maritime and Automotive”, In book: Computation and Big Data for Transport (2022).
- [20] R. Bolz, M. Rumez, F. Sommer, J. Dürrwang & R. Kriesten, “Enhancement of Cyber Security for Cyber Physical Systems in the Automotive Field Through Attack Analysis”, In book: embedded world Conference 2020 Proceedings.
- [21] Information Security in Logistics and Transportation, Tadviser (2020). Available at https://www.tadviser.ru/a/619857.
- [22] Visualization of the maritime transportation market. Interlegal. Available at: https://interlegal.com.ua/ru/publikacii/virtualizaciya_rynka_morskih_perevozok/.
- [23] S. Chan, E. Yehuda, R. Schaefer, A. Schneuwly, S. Zicherman, S. Deutscher, & O. Klier, “Navigating Rising Cyber Risks in Transportation and Logistics”, Boston Consulting Group (2021).
- [24] O. Melnyk, Y. Bychkovsky & A. Voloshyn, “Maritime situational awareness as a key measure for safe ship operation”, Scientific Journal of Silesian University of Technology. Series Transport (2022), 114, pp. 91 - 101.
- [25] S. Onyshсhenko & O. Melnyk, “Probabilistic Assessment Method of Hydrometeorological Conditions and their Impact on the Efficiency of Ship Operation”, Journal of Engineering Science and Technology Review (2021), 14 (6), pp. 132 – 136.
- [26] I. Burmaka, I. Vorokhobin, O. Melnyk, O. Burmaka & S. Sagin, “Method of Prompt Evasive Manuever Selection to Alter Ship's Course or Speed”, Transactions on Maritime Science (2022), 11 (1), pp. 1 – 9.
- [27] N. Malaksiano, “On the stability of economic indicators of complex port equipment usage”, Actual Problems of Economics (2012), 138(12), pp. 226–233.
- [28] I. Lapkina, M. Malaksiano & M. Malaksiano, “Optimization of the structure of sea port equipment fleet under unbalanced load”, Actual Problems of Economics (2016), 183(9), pp. 364–371.
- [29] A. Weintrit, T. Neumann, T. Safety of marine transport introduction. Safety of marine transport: Marine navigation and safety of sea transportation (2015) (pp. 1-4) doi:10.1201/b18515
- [30] Y. Kirillova & Y. Meleshenko, “Development of an economic and mathematical model of loading a freight and passenger ferry”, Eastern-European Journal of Enterprise Technologies (2016), 3 (4-81), pp. 28 - 37.
- [31] E. Kirillova, “Justification of stability ranges of commercially reasonable, allowable loss-making and crisis operation of the vessel”, Eastern-European Journal of Enterprise Technologies (2015), 6 (3), pp. 4 – 10.
- [32] O. Drozhzhyn, Y. Koskina & I. Tykhonina, “Liner shipping”: The evolution of the concept, Pomorstvo (2021), 35 (2), pp. 365 – 371.
- [33] O. Drozhzhyn & Y. Koskina, “The model of container feeder line organization focused on the nature and parameters of external container flows”, Communications - Scientific Letters of the University of Žilina (2021), 23 (2), pp. A94 - A102.
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b9d7b496-d3f4-4d53-9398-f04486ed863a