Abstract
This chapter addresses the issue of cybersecurity in the global maritime system. The maritime system is a set of interconnected infrastructures that facilitates trade across major bodies of water. Covered here are the problem of protecting maritime traffic from attack as well as how cyberattacks change the equation for securing commercial shipping from attack on the high seas. The authors ask what cyberattack aimed at maritime targets—ships, ports, and other elements—looks like and what protections have been emplaced to counter the threat of cyberattack upon the maritime system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Øvergård KI, Sorensen LJ, Nazir S, Martinsen TJ (2015) Critical incidents during dynamic positioning: operators’ situation awareness and decision-making in maritime operations. Theor Issues Ergon Sci 16(4):366–387
Bueger C (2015) What is maritime security? Mar Policy 53:159–164
Mahan AT (2013) The influence of sea power upon history 1660–1783. Read Books Ltd
Wood RS, Hanley JT Jr (1985) The maritime role in the North Atlantic. Naval War College Rev 38(6):5–18
Mearsheimer JJ (1986) A strategic misstep: The maritime strategy and deterrence in Europe. Int Secur 11(2):3–57
Feyrer J (2009) Distance, trade, and income: the 1967 to 1975 closing of the Suez Canal as a natural experiment. In: Working paper 15557, National Bureau of Economic Research
Parinduri R (2012) Growth volatility and trade: evidence from the 1967–1975 closure of the Suez Canal. MPRA Paper No. 39040, University of Munich
O’Rourke R (1988) The tanker war. Proceedings 114(5)
Murphy MN (2008) Small boats, weak states, dirty money: the challenge of piracy. Columbia University Press, New York
Coleman G (2014) Hacker, hoaxer, whistleblower, spy: the many faces of anonymous. Verso books
Nicholson A, Webber S, Dyer S, Patel T, Janicke H (2012) SCADA security in the light of cyber-warfare. Comput Secur 31(4):418–436
UNCTAD (2017) Review of maritime transport. In: Geneva: United Nations Conference on Trade and Development (UNCTAD)
Greenberg A (2018) The untold story of NotPetya, the most devastating cyberattack in history. Wired, September
Hayes CR (2016) Maritime cybersecurity: the future of national security. Master’s thesis, Naval Postgraduate School, Monterey, CA
US. Command investigation into the grounding of USS guardian (MCM 5) on Tubbataha Reef, Republic of the Philippines that occurred on 17 January 2013. United States Pacific Fleet (2013)
Kramek J (2013) The critical infrastructure gap: U.S. port facilities and cyber vulnerabilities. Brookings
NIST (2016) CVE-2016-5817 detail. National Institute of Standards and Technology (NIST)
US. Maritime jurisdiction. U.S. Department of Justice, archived, https://www.justice.gov/archives/jm/criminal-resource-manual-670-maritime-jurisdiction
Schmitt MN (ed) (2017) Tallinn manual 2.0 on the international law applicable to cyber operations, 2nd ed, Cambridge University Press
US. United States coast guard cyber strategy. US Coast Guard (2015)
IMO (2017) Guidelines on maritime cyber risk management. International Maritime Organization (IMO)
ICS (2018) The guidelines on cybersecurity onboard ships, version 3. International Chamber of Shipping (ICS) and other organizations
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bronk, C., deWitte, P. (2022). Maritime Cybersecurity: Meeting Threats to Globalization’s Great Conveyor. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security. Computational Methods in Applied Sciences, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-030-91293-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-91293-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91292-5
Online ISBN: 978-3-030-91293-2
eBook Packages: Computer ScienceComputer Science (R0)