PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Wybrane aspekty cyberbezpieczeństwa autonomicznych statków morskich

Treść / Zawartość
Identyfikatory
Warianty tytułu
EN
Selected aspects of cybersecurity of maritime autonomous surface ships
Języki publikacji
PL
Abstrakty
PL
W artykule poruszono zagadnienia dotyczące cyberbezpieczeństwa autonomicznych statków morskich. Scharakteryzowano wybrane cyberataki, które miały miejsce w sektorze morskim. Omówiono cele, sekwencję i skutki cyberataków oraz regulacje prawne w zakresie cyberbezpieczeństwa morskiego. Jednak najwięcej uwagi poświęcono sposobom zapobiegania cyberzagrożeniom i kształtowaniu przemyślanej polityki cyberbezpieczeństwa morskiego.
EN
The article deals with cybersecurity of maritime autonomous surface ships. Selected cyber attacks that took place in the maritime sector were characterized. The objectives, sequence and effects of cyber attacks as well as legal regulations in the field of maritime cybersecurity were discussed. However, most attention has been paid to how to prevent cyber threats and to shape a proper maritime cybersecurity policy.
Rocznik
Tom
Strony
167--198
Opis fizyczny
Bibliogr. 33 poz., tab.
Twórcy
  • Akademia Marynarki Wojennej w Gdyni
Bibliografia
  • 1. BIMCO, CLIA, ICS, INTERCARGO, INTERMANAGER, INTERTANKO, IUMI, OCIMF and WSC, The Guidelines on Cyber Security Onboard Ships, ver. 3., 2017.
  • 2. Blenkey N., Cybersecurity: Attacks on OT systems are on the increase, https://www.marinelog.com/news/cybersecurity-attacks-on-ot-systems-are-on-the-increase.
  • 3. Bolbota V., Theotokatosa G., Boulougourisa E., Vassalosa D., A novel cyberrisk assessment meth-od for ship systems, „Safety Science” Nr 131 (2020) 104908.
  • 4. Bureau Veritas, Guidelines for Autonomous Shipping, Guidance Note NI 641 DT R00 E, Paris 2017.
  • 5. CIS, Critical Security Controls for Effective Cyber Security, www.cisecurity.org/critical-controls.cfm.
  • 6. D'mello A., IEC 62443: How to achieve the highest levels of industrial security, https://www.iotglobalnetwork.com/iotdir/2020/04/16/iec-62443-how-to-achieve-the-highest-levels-of-industrial-security-24420.
  • 7. Federal Information Processing Standards, Standards for Security Categorization of Federal Information and Information Systems, National Institute of Standards and Technology, Gaithersburg, MD 20899-8900.
  • 8. Fruhlinger J., Petya ransomware and NotPetya malware: What you need to know now, https://www.csoonline.com/article/3233210/petya-ransomware-and-notpetya-malware-what-you-need-to-know-now.html.
  • 9. Greenberg A., A Guide to LockerGoga, the Ransomware Crippling Industrial Firms, https://www.wired.com/story/lockergoga-ransomware-cripplingindustrial-firms.
  • 10. Greenberg A., The Untold Story of NotPetya, the Most Devastating Cyberattack in History, https://www.wired.com/story/notpetya-cyberattackukraine-russia code-crashed-the-world.
  • 11. IMO, Guidelines on maritime cyber risk management, MSC-FAL.1/Circ.3, 5 July 2017, Aneks.
  • 12. Lopez E., COSCO restores service 5 days after cyberattack, https://www.supplychaindive.com/news/COSCO-cyberattack-restoresservice/528897.
  • 13. Lopez E., Ransomware attack hits COSCO in US, https://www.supplychaindive.com/news/COSCO-US-ransomware-attack/528557.
  • 14. MacDonald N., Firstbrook P., Designing an Adaptive Security Architecture for Protection from Advanced Attacks, https://www.gartner.com/en/documents/2665515.
  • 15. Maritime Logistics Professional, Total Shipping Losses Are Declining, But Challenges Persist – Report, https://www.maritimeprofessional.com/news/total-shipping-losses-declining-challenges-360154.
  • 16. Mission Secure, IMO 2021: Three Steps to Ensure IMO/ISM Cybersecurity Compliance, https://www.missionsecure.com/blog/imo-2021-threesteps-to-ensure-imo-cybersecurity-compliance.
  • 17. Mission Secure, Maritime Security Challenges: The Physical Impact of Maritime Cyber Threats, https://www.missionsecure.com/blog/the-physicalimpact-of maritime-cyberthreats.
  • 18. Paris C., China’s Cosco Shipping Hit by Cyberattack in U.S., https://www.wsj.com/articles/chinas-cosco-shipping-hit-by-cyberattack-in-u-s-1532548557.
  • 19. Ragan S., SamSam explained: Everything you need to know about this opportunistic group of threat actors, https://www.csoonline.com/article/3263777/samsam-explained-everything-you-need-to-know-aboutthis-opportunistic-group-of-threat-actors.html.
  • 20. Said K., Agamy M., The impact of cybersecurity on the future of Autonomous ships, International Journal of Recent Research in Interdisciplinary Sciences (IJRRIS), Vol. 6, Issue 2, Month: April - June 2019.
  • 21. Searle S., Burke B., Cearley D., Walker M., Top 10 Strategic Technology Trends for 2017: A Gartner Trend Insight Report, https://www.gartner.com/en/documents/3645332.
  • 22. Staśkiewicz J., System Zarządzania Bezpieczeństwem Informacji wg ISO 27001, https://opensecurity.pl/bezpieczenstwo-informacji-wg-iso27001.
  • 23. Suiche M., Petya.2017 is a wiper not a ransomware, https://blog.comae.io/petya-2017-is-a-wiper-not-a-ransomware-9ea1d8961d3b.
  • 24. Tomter L., Gundersen M., IT-sjefen i Hydro om dataangrepet: – Man tror krisen blir stor, så blir den enda verre, https://www.nrk.no/norge/it-sjefen-i-hydro-om-dataangrepet_-_-man-tror-krisen-blir-stor_-sa-blir-denenda-verre-1.14515043.
  • 25. Warrick J., Nakashima E., Officials: Israel linked to a disruptive cyberattack on Iranian port facility, https://www.washingtonpost.com/national-security/officials-israel-linked-to-a-disruptive-cyberattack-on-iranian-portfacility/2020/05/18/9d1da866-9942-11ea-89fd28fb313d1886_story.html.
  • 26. https://safety4sea.com/guidelines-on-maritime-cyber-risk-management.
  • 27. https://searchsecurity.techtarget.com/definition/cybersecurity.
  • 28. https://sklep.pkn.pl/pn-en-iso-iec-27001-2017-06p.html.
  • 29. https://www.iec.ch/cybersecurity/?ref=extfooter.
  • 30. https://www.kennedyslaw.com/thought-leadership/article/cyber-exclusion-clauses-are-they-fit-for-purpose.
  • 31. https://www.nist.gov/cyberframework/framework.
  • 32. https://www.ocimf.org/sire/about-tmsa.
  • 33. https://www.sertica.com/tmsa/#gref.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-f253f1b8-68d2-49eb-a3d8-22ad46e1c5b6
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.