2020
DOI: 10.1016/j.ssci.2020.104908
|View full text |Cite
|
Sign up to set email alerts
|

A novel cyber-risk assessment method for ship systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
18
0
4

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 75 publications
(34 citation statements)
references
References 23 publications
1
18
0
4
Order By: Relevance
“…For cybersecurity related events, in addition to the accident/incidents type, events as confidentiality breach and operation disruption are used. Furthermore, different threat groups (cyberterrorists, cybercriminals, hacktivists, generic hackers, competitors, states) 9 are considered and guidewords, such as steal (targetting at confidentiality), destroy, switch off (targetting at availability), get control over, transfer, manipulate, falsify (targetting at integrity) are used to identify relevant cybersecurity hazardous scenarios. In this way, confidentially loss, integrity loss or/and unavailability due to cyberattacks constitute either hazards or causes to hazards and are located either in the centre or at the left side of the Bow-Tie diagram shown in Figure 3.…”
Section: Risk Assessment Process Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…For cybersecurity related events, in addition to the accident/incidents type, events as confidentiality breach and operation disruption are used. Furthermore, different threat groups (cyberterrorists, cybercriminals, hacktivists, generic hackers, competitors, states) 9 are considered and guidewords, such as steal (targetting at confidentiality), destroy, switch off (targetting at availability), get control over, transfer, manipulate, falsify (targetting at integrity) are used to identify relevant cybersecurity hazardous scenarios. In this way, confidentially loss, integrity loss or/and unavailability due to cyberattacks constitute either hazards or causes to hazards and are located either in the centre or at the left side of the Bow-Tie diagram shown in Figure 3.…”
Section: Risk Assessment Process Overviewmentioning
confidence: 99%
“…2 The lack of statistical data for the autonomous and unmanned ships also impedes the quantitative estimation of the risks and the associated uncertainty. 9 Another challenge is associated with the identification of relevant testing scenarios for autonomous ships. At the same time, the ship operating phases considerably affect the severity of the potential hazardous scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…During a discussion at the 2004 RSA Data Security Conference, the need for dedicated stream ciphers was questioned following the success of the AES. As an argument for the use of dedicated stream cipher designs, Shamir [27, page 1] identified two key areas in which dedicated stream ciphers could offer an advantage over block ciphers, namely: "(1) where exceptionally high throughput is required in software and (2) where exceptionally low resource consumption is required in hardware".…”
Section: Estream Portfoliomentioning
confidence: 99%
“…The present regulatory framework governs the safety and security of conventional ships and their onboard crew, but the crew will be moved from ship to shore through the use of remote and autonomous ship technology. This disruptive shift will lead to new ship designs (MUNIN 2013), new roles for the crew, new interactions with the crew (Bolbot et al 2019) and new management procedures and leadership schemes (Kim and Mallam 2020), as well as new cybersecurity hazards (Bolbot et al 2020). These are not explicitly addressed by the present maritime regulations (neither at IMO nor at inland waterway regulatory level), as the key regulatory instruments are based on the assumption that the crew is present on board ships.…”
Section: Introductionmentioning
confidence: 99%