2019
DOI: 10.1007/s13437-019-00183-x
|View full text |Cite
|
Sign up to set email alerts
|

Assessing ship cyber risks: a framework and case study of ECDIS security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(31 citation statements)
references
References 10 publications
0
27
0
Order By: Relevance
“…The cybersecurity testing of the INS was conducted with the world's most widely deployed industry vulnerability scanner, Nessus Professional version 8.0.1 [29]. Vulnerability scanning is a passive method of reviewing the INS to gain comprehensive insight into all vulnerabilities that are already known to the cybersecurity community, attackers, and software developers [6,30]. A laptop with the installed vulnerability scanner was connected directly to the INS with a crossover Ethernet cable.…”
Section: Cybersecurity Testingmentioning
confidence: 99%
“…The cybersecurity testing of the INS was conducted with the world's most widely deployed industry vulnerability scanner, Nessus Professional version 8.0.1 [29]. Vulnerability scanning is a passive method of reviewing the INS to gain comprehensive insight into all vulnerabilities that are already known to the cybersecurity community, attackers, and software developers [6,30]. A laptop with the installed vulnerability scanner was connected directly to the INS with a crossover Ethernet cable.…”
Section: Cybersecurity Testingmentioning
confidence: 99%
“…The cyber security testing of the ECDIS was performed using the industry most widely used vulnerability scanner, the Nessus Professional version 8.0.1 (Nessus, 2019). The vulnerability scanning is a computational method of detecting cyber vulnerabilities, which are known not only to the manufactures of the software and the underlying operating system, but also to potential attackers (Svilicic et al, 2019c;Svilicic et al, 2018). Figure 3 shows the testing setup.…”
Section: Cyber Security Testingmentioning
confidence: 99%
“…The ECDIS is basically a software package with standardized functionality by IMO performance standards (IMO, 2017c), which is running on a general operating system from a different manufacturer than the system itself. It has been shown that the ECDIS underlying operating system is a source of major cyber threats (Svilicic et al, 2019b;Svilicic et al, 2019c). However, most of the today`s software is comprised of third-party components, which are developed by an entity other than the manufactures of the software or the underlying operating system.…”
Section: Introductionmentioning
confidence: 99%
“…More advanced tools are used to overcome the privacy of user by cybercriminals and obtaining the required results. 2 billion data records have been compromised by the year of 2017 [10], more over additional 4.5 billion records were breach in the first half of 2018 alone. The rising trends and the security issues are listed below.…”
Section: Cybercrimesmentioning
confidence: 99%
“…It may make improper function of IOT connected devices. So we must be safe and secure our devices and by the knowledgeable application to given permissions on [10] your devices. Malware may use your devices and access to get hardware access to network database in wireless IOT.…”
Section: Device Authenticationmentioning
confidence: 99%