Abstract
Over the past few years there has been growing interest in the issues of cybersecurity and maritime security, but far too little attention has been paid to the combination of the two security problems; and yet there are clear and critical points of intersection. The dependence of the international maritime community on cyberspace is substantially increasing and, thus, forges new and unexpected vulnerabilities. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The maritime community, consisting of maritime transport, port operations, critical offshore infrastructure and digital economic transactions is heavily structured around online systems. The chapter assesses the risks and vulnerabilities of the international maritime sector in regard to cybersecurity and identifies potential tools and international measures to enhance cyber resilience in the wider maritime security field. The chapter contributes to a deeper understanding of the wider dynamics of these implications, providing the basic principles, comprehension and framework in order to apply cyber resilience together with situational awareness, business continuity plan and risk management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
These events will be analysed later on. We refer to the ransomware attack at NHS and the “Petya” attack respectively.
- 2.
These include but are not limited to Maritime Security Centre - Horn of Africa (MSCHOA), United Kingdom Maritime Trade Operations (UKMTO) and the NATO Shipping Centre (NSC).
- 3.
USCG Cyber Strategy 2015. The UK Maritime Strategy identifies cyber-attacks at the maritime domain as one of the five Maritime Security Risks (UK Government 2014, p. 19).
- 4.
TMSA 3 programme provides companies with a means to improve and measure their own safety management systems. For further details see www.ocimf.org/sire/about-tmsa.aspx.
- 5.
For further details see IMO (2016).
- 6.
Although common sense, research conducted by Chatham House, a UK-based think tank, has indicated that such response plans are not in place in most of the world’s shipping companies, at the time of writing if this chapter (Autumn 2018).
- 7.
These four case studies where part of an Industrial e-paper that was published by Knect365, where the writer was asked to comment and advise. Further details can be found on Knect365 (2018).
- 8.
In general, ship systems are distinguished in two categories, the IT and OT. The first category includes IT System Management, Surveillance within the ship, Maintenance monitoring, crew and passenger entertainment and any other system that offers support to a ships’ operation cycle. OT systems are the core systems that control the ship’s daily operations and include power generation and distribution, propulsion, navigation and steering, ship-to-ship and ship-to-shore, along with emergency and distress communications and so forth. These are the systems that are first on the priority list regarding cybersecurity for ships. For further details see http://www.ics-shipping.org/docs/default-source/resources/safety-security-and-operations/guidelines-on-cyber-security-onboard-ships.pdf?sfvrsn=16
References
Azeem A, Wakefield A, Button M (2013) Addressing the weakest link: implementing converged security. Secur J 26(3):236–248
BIMCO (2018) The guidelines on cybersecurity onboard ships. BIMCO et al, London
Bishop M (2003) What is computer security? IEEE Secur Priv 1(99):67–69
EU (2014) EU maritime security strategy. European Commission, Brussels
UK Government (2014) The UK national strategy for maritime security. OGL, London
IMO (2016) Interim guidelines on maritime cyber risk management. IMO, London
Knect365 (2018) Shipping 2030: collaboration in the shipping industry: innovation and technology. Informa Publishing, London
NISTIR (2013) NISTIR 7298: glossary of key information security terms, revision 2. Washington, DC, NIST
Rossouw VS, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97–102
Weber R, Weber R (2010) Internet of things: legal perspectives. Springer, Berlin
WSJ (2018) Cocaine’s new gateway to Europe: busy Belgian port. s.n, Antwerp
Kapalidis C (2016) ISIS is closing in on Europe’s backyard, Middle East Monitor. Available at https://www.middleeastmonitor.com/20150314-isis-is-closing-in-on-europes-backyard/
Kapalidis C (2017) Maritime Cyber Security: No Substitute for Testing, Chatham House. Available at https://www.chathamhouse.org/expert/comment/maritime-cyber-security-no-substitute-testing
Institute of Engineering and Technology (2017) Code of practice: cyber security for ships. IET, London
Singer PW, Friedman A (2014) Cybersecurity and cyberwar: what everyone needs to know. Oxford University Press, Oxford
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Annex A (Table 8.2)
Annex A (Table 8.2)
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kapalidis, P. (2020). Cybersecurity at Sea. In: Otto, L. (eds) Global Challenges in Maritime Security. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-34630-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-34630-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34629-4
Online ISBN: 978-3-030-34630-0
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)