Skip to main content

Maritime Cybersecurity: Meeting Threats to Globalization’s Great Conveyor

  • Chapter
  • First Online:
Cyber Security

Part of the book series: Computational Methods in Applied Sciences ((COMPUTMETHODS,volume 56))

Abstract

This chapter addresses the issue of cybersecurity in the global maritime system. The maritime system is a set of interconnected infrastructures that facilitates trade across major bodies of water. Covered here are the problem of protecting maritime traffic from attack as well as how cyberattacks change the equation for securing commercial shipping from attack on the high seas. The authors ask what cyberattack aimed at maritime targets—ships, ports, and other elements—looks like and what protections have been emplaced to counter the threat of cyberattack upon the maritime system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Øvergård KI, Sorensen LJ, Nazir S, Martinsen TJ (2015) Critical incidents during dynamic positioning: operators’ situation awareness and decision-making in maritime operations. Theor Issues Ergon Sci 16(4):366–387

    Article  Google Scholar 

  2. Bueger C (2015) What is maritime security? Mar Policy 53:159–164

    Article  Google Scholar 

  3. Mahan AT (2013) The influence of sea power upon history 1660–1783. Read Books Ltd

    Google Scholar 

  4. Wood RS, Hanley JT Jr (1985) The maritime role in the North Atlantic. Naval War College Rev 38(6):5–18

    Google Scholar 

  5. Mearsheimer JJ (1986) A strategic misstep: The maritime strategy and deterrence in Europe. Int Secur 11(2):3–57

    Article  Google Scholar 

  6. Feyrer J (2009) Distance, trade, and income: the 1967 to 1975 closing of the Suez Canal as a natural experiment. In: Working paper 15557, National Bureau of Economic Research

    Google Scholar 

  7. Parinduri R (2012) Growth volatility and trade: evidence from the 1967–1975 closure of the Suez Canal. MPRA Paper No. 39040, University of Munich

    Google Scholar 

  8. O’Rourke R (1988) The tanker war. Proceedings 114(5)

    Google Scholar 

  9. Murphy MN (2008) Small boats, weak states, dirty money: the challenge of piracy. Columbia University Press, New York

    Google Scholar 

  10. Coleman G (2014) Hacker, hoaxer, whistleblower, spy: the many faces of anonymous. Verso books

    Google Scholar 

  11. Nicholson A, Webber S, Dyer S, Patel T, Janicke H (2012) SCADA security in the light of cyber-warfare. Comput Secur 31(4):418–436

    Article  Google Scholar 

  12. UNCTAD (2017) Review of maritime transport. In: Geneva: United Nations Conference on Trade and Development (UNCTAD)

    Google Scholar 

  13. Greenberg A (2018) The untold story of NotPetya, the most devastating cyberattack in history. Wired, September

    Google Scholar 

  14. Hayes CR (2016) Maritime cybersecurity: the future of national security. Master’s thesis, Naval Postgraduate School, Monterey, CA

    Google Scholar 

  15. US. Command investigation into the grounding of USS guardian (MCM 5) on Tubbataha Reef, Republic of the Philippines that occurred on 17 January 2013. United States Pacific Fleet (2013)

    Google Scholar 

  16. Kramek J (2013) The critical infrastructure gap: U.S. port facilities and cyber vulnerabilities. Brookings

    Google Scholar 

  17. NIST (2016) CVE-2016-5817 detail. National Institute of Standards and Technology (NIST)

    Google Scholar 

  18. US. Maritime jurisdiction. U.S. Department of Justice, archived, https://www.justice.gov/archives/jm/criminal-resource-manual-670-maritime-jurisdiction

  19. Schmitt MN (ed) (2017) Tallinn manual 2.0 on the international law applicable to cyber operations, 2nd ed, Cambridge University Press

    Google Scholar 

  20. US. United States coast guard cyber strategy. US Coast Guard (2015)

    Google Scholar 

  21. IMO (2017) Guidelines on maritime cyber risk management. International Maritime Organization (IMO)

    Google Scholar 

  22. ICS (2018) The guidelines on cybersecurity onboard ships, version 3. International Chamber of Shipping (ICS) and other organizations

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chris Bronk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bronk, C., deWitte, P. (2022). Maritime Cybersecurity: Meeting Threats to Globalization’s Great Conveyor. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security. Computational Methods in Applied Sciences, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-030-91293-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91293-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91292-5

  • Online ISBN: 978-3-030-91293-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics