Cyber Threat Analysis in Smart Terminal Systems

被引:0
|
作者
Simola, Jussi [1 ]
Poyhonen, Jouni [1 ]
Lehto, Martti [1 ]
机构
[1] Univ Jyvaskyla, Jyvaskyla, Finland
关键词
Maritime Logistics; Smart Terminal Process; Cyber Security Analysis; Threats;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have changed to a combination of threat types. While developing cyber or physical threats may evolve into hybrid threats, it may prevent everyday harbor activities so that damage can become long-lasting and harm business continuity management. Therefore, it is essential to analyze cyber threat factors in Smart Terminal Systems. The research provides cyber threat and vulnerability analysis and the main attack vectors in the Smart Terminal systems. This research belongs in Finland to the maritime Sea4Value (S4VF) research program that includes Smart Terminals (SMARTER) project for harbor's digitalization.
引用
收藏
页码:369 / 378
页数:10
相关论文
共 50 条
  • [31] A Cyber-Physical Threat Analysis for Microgrids
    Rekik, Mouna
    Chtourou, Zied
    Gransart, Christophe
    Atieh, Ahmad
    2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, : 731 - 737
  • [32] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [33] Cyber-Physical Systems in Smart Transportation
    Moeller, Dietmar P. F.
    Vakilzadian, Hamid
    2016 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2016, : 776 - 781
  • [34] A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks
    Wadhawan, Yatin
    AlMajali, Anas
    Neuman, Clifford
    ELECTRONICS, 2018, 7 (10)
  • [35] ANALYSIS OF RISK TERMINAL FLOWS IN TECHNOGENIC SYSTEMS ARISING IN THE PROCESS OF THREAT IMPACT
    Sabat, V. I.
    Sikora, L. S.
    Durnyak, B. V.
    Povkhan, I. F.
    Polishchuk, V. V.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2023, (01) : 155 - 169
  • [36] Cyber-Physical Systems Architectures and Modeling Methods Analysis for Smart Grids
    Korotunov, Sergiy
    GalynaTabunshchyk
    Wolff, Carsten
    2018 IEEE 13TH INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE ON COMPUTER SCIENCES AND INFORMATION TECHNOLOGIES (CSIT), VOL 1, 2018, : 181 - 186
  • [37] Cyber-interdependency in Smart Energy Systems
    Ebrahimy, Razgar
    Pourmirza, Zoya
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 529 - 537
  • [38] An Analysis of the State of Framework Development for Reasoning in Smart Cyber-Physical Systems
    Tepjit, Sirsak
    Horvath, Imre
    Rusak, Zoltan
    TRANSDISCIPLINARY ENGINEERING METHODS FOR SOCIAL INNOVATION OF INDUSTRY 4.0, 2018, 7 : 82 - 92
  • [39] ANALYSIS OF RISK TERMINAL FLOWS IN TECHNOGENIC SYSTEMS ARISING IN THE PROCESS OF THREAT IMPACT
    Sabat, V. I.
    Sikora, L. S.
    Durnyak, B. V.
    Povkhan, I. F.
    Polishchuk, V. V.
    SCIENCE OF THE TOTAL ENVIRONMENT, 2023, 873 : 155 - 169
  • [40] Cyber Threat Information Classification and Life Cycle Management using Smart Contracts
    Graf, Roman
    King, Ross
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 304 - 311