Commercial Maritime and Cyber Risk Management
PDF

Keywords

commercial maritime
cyber threat
cyber risk management
maritime security
security

How to Cite

RANA, A. (2019). Commercial Maritime and Cyber Risk Management. Safety & Defense, 5(1), 46-48. https://doi.org/10.37105/sd.42

Abstract

The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines.

https://doi.org/10.37105/sd.42
PDF

References

Jones, K.D., Tam, K., Papadaki, M. (2016). Threats and Impacts in Maritime Cyber Security. Engineering & Technology Reference,

, doi: 10.1049/etr.2015.0123.

BIMKO et al. (2018). The Guidelines On Cyber Security Onboard Ships, Version 3, retrieved from: https://iumi.com/uploads/2018-Cyber_

Security_Guidelines.pdf

MSC FAL.1/Circ. 3. [International Maritime Organization] (2017). Guidelines on Maritime Cyber Risk Management (5 July 2017),

retrieved from: http://www.imo.org/en/OurWork/Security/Guide_to_ Maritime_Security/Documents/MSC-FAL.1-Circ.3%20-%20Guidelines%

On%20Maritime%20Cyber%20Risk%20Management%20 (Secretariat).pdf

DfT. [Department of Transport] (2017). Code of Practice: Cyber Security for Ships, retrieved from: https://assets.publishing.service.gov.uk/

government/uploads/system/uploads/attachment_data/file/642598/ cyber-security-code-of-practice-for-ships.pdf (16.06.2019.).

www.theiet.org/standards

UT Media. (2013). UT Austin Researchers Successfully Spoof an $80 million Yacht at Sea (29 July 2013), retrieved from: https://news. utexas.edu/2013/07/29/ut-austin-researchers-successfully-spoofan-80-million-yacht-at-sea/

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.