Cyber Threat Analysis in Smart Terminal Systems

被引:0
|
作者
Simola, Jussi [1 ]
Poyhonen, Jouni [1 ]
Lehto, Martti [1 ]
机构
[1] Univ Jyvaskyla, Jyvaskyla, Finland
关键词
Maritime Logistics; Smart Terminal Process; Cyber Security Analysis; Threats;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have changed to a combination of threat types. While developing cyber or physical threats may evolve into hybrid threats, it may prevent everyday harbor activities so that damage can become long-lasting and harm business continuity management. Therefore, it is essential to analyze cyber threat factors in Smart Terminal Systems. The research provides cyber threat and vulnerability analysis and the main attack vectors in the Smart Terminal systems. This research belongs in Finland to the maritime Sea4Value (S4VF) research program that includes Smart Terminals (SMARTER) project for harbor's digitalization.
引用
收藏
页码:369 / 378
页数:10
相关论文
共 50 条
  • [41] A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
    Navod Neranjan Thilakarathne
    Muhammad Saifullah Abu Bakar
    Pg Emeroylariffion Abas
    Hayati Yassin
    Scientific Reports, 15 (1)
  • [42] Cyber security in smart agriculture: Threat types, current status, and future trends
    Alahe, Mohammad Ashik
    Wei, Lin
    Chang, Young
    Gummi, Sainath Reddy
    Kemeshi, James
    Yang, Xufei
    Won, Kwanghee
    Sher, Mazhar
    COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2024, 226
  • [43] Cyber Threat Landscape in Cyber Space
    Shanker, Anusha Kadambari
    Usha, G.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 375 - 380
  • [44] Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness
    Ul Haque, Ehtisham
    Abbasi, Waseem
    Murugesan, Sathishkumar
    Anwar, Muhammad Shahid
    Khan, Faheem
    Lee, Youngmoon
    IEEE ACCESS, 2023, 11 : 40049 - 40063
  • [45] Threat analysis of smart mobile device
    Pu, Shi
    Chen, Zhouguo
    Huang, Chen
    Liu, Yiming
    Zen, Bing
    2014 31th URSI General Assembly and Scientific Symposium, URSI GASS 2014, 2014,
  • [46] Threat Analysis of Smart Mobile Device
    Pu, Shi
    Chen, Zhouguo
    Huang, Chen
    Liu, Yiming
    Zen, Bing
    2014 XXXITH URSI GENERAL ASSEMBLY AND SCIENTIFIC SYMPOSIUM (URSI GASS), 2014,
  • [47] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [48] On Threat Modeling and Mitigation of Medical Cyber-Physical Systems
    Almohri, Hussain
    Cheng, Long
    Yao, Danfeng
    Alemzadeh, Homa
    2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, : 114 - 119
  • [49] Cyber Threat Scenarios for Electrical Systems of Nuclear Power Plants
    Gupta, Deeksha
    Bajramovic, Edith
    Parekh, Mithil
    Waedt, Karl
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2018, VOL 9, 2018,
  • [50] Data Poisoning: Achilles Heel of Cyber Threat Intelligence Systems
    Mahlangu, Thabo
    January, Sinethemba
    Mashiane, Thulani
    Dlamini, Moses
    Ngobeni, Sipho
    Ruxwana, Nkqubela
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 221 - 230