Cyber Threat Analysis in Smart Terminal Systems

被引:0
|
作者
Simola, Jussi [1 ]
Poyhonen, Jouni [1 ]
Lehto, Martti [1 ]
机构
[1] Univ Jyvaskyla, Jyvaskyla, Finland
关键词
Maritime Logistics; Smart Terminal Process; Cyber Security Analysis; Threats;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have changed to a combination of threat types. While developing cyber or physical threats may evolve into hybrid threats, it may prevent everyday harbor activities so that damage can become long-lasting and harm business continuity management. Therefore, it is essential to analyze cyber threat factors in Smart Terminal Systems. The research provides cyber threat and vulnerability analysis and the main attack vectors in the Smart Terminal systems. This research belongs in Finland to the maritime Sea4Value (S4VF) research program that includes Smart Terminals (SMARTER) project for harbor's digitalization.
引用
收藏
页码:369 / 378
页数:10
相关论文
共 50 条
  • [21] Mediating Cyber and Physical Threat Propagation in Secure Smart Grid Architectures
    Neuman, Clifford
    Tan, Kymie
    2011 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2011,
  • [22] Threat Analysis for Smart Homes
    Kavallieratos, Georgios
    Chowdhury, Nabin
    Katsikas, Sokratis
    Gkioulos, Vasileios
    Wolthusen, Stephen
    FUTURE INTERNET, 2019, 11 (10):
  • [23] Cyber threat
    Herzenberg, Caroline
    NEW SCIENTIST, 2013, 219 (2936) : 32 - 32
  • [24] Threat Modeling of Cyber-Physical Systems in Practice
    Jamil, Ameerah-Muhsinah
    Ben Othmane, Lotfi
    Valani, Altaz
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2021), 2022, 13204 : 3 - 19
  • [25] CYBER TERRORISM - A MODERN SECURITY THREAT TO INFORMATION SYSTEMS
    Prislan, Kaja
    Bernik, Igor
    POLICING IN CENTRAL AND EASTERN EUROPE - SOCIAL CONTROL OF UNCONVENTIONAL DEVIANCE: CONFERENCE PROCEEDINGS, 2011, : 175 - +
  • [26] Sensor Threat Isolation for Cyber-Physical Systems
    Zhang, Kangkang
    Kasis, Andreas
    Keliris, Christodoulos
    Polycarpou, Marios M.
    Parisini, Thomas
    IFAC PAPERSONLINE, 2023, 56 (02): : 11324 - 11329
  • [27] A Reference Model for Cyber Threat Intelligence (CTI) Systems
    Sakellariou, Georgios
    Fouliras, Panagiotis
    Mavridis, Ioannis
    Sarigiannidis, Panagiotis
    ELECTRONICS, 2022, 11 (09)
  • [28] ePilotage System of Systems' Cyber Threat Impact Evaluation
    Kovanen, Tiina
    Poyhonen, Jouni
    Lehto, Martti
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 144 - 151
  • [29] IWTW: A Framework for IoWT Cyber Threat Analysis
    Jeon, GyuHyun
    Jin, Hojun
    Lee, Ju Hyeon
    Jeon, Seungho
    Seo, Jung Taek
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, : 1575 - 1622
  • [30] Trustworthy Artificial Intelligence for Cyber Threat Analysis
    Wang, Shuangbao Paul
    Mullin, Paul A.
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, 2023, 542 : 493 - 504