Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth

被引:14
|
作者
Amro, Ahmed [1 ]
Gkioulos, Vasileios [1 ]
机构
[1] Norwegian Univ Sci & Technol, Teknol Vegen 22, N-2815 Gjovik, Norway
关键词
Autonomous Passenger Ship; Cybersecurity architecture; ATT&CK; Defense-in-Depth; Cyber risk Management; AUTHENTICATION; AIS;
D O I
10.1007/s10207-022-00638-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways. The novelty of the APS concept influenced the cyber risk paradigm and led to different considerations regarding attack objectives, techniques as well as risk management approaches. The main factor that has led to this is the autoremote operational mode, which refers to autonomous operations and remote supervision and control in case of emergency. The autoremote operational mode influences the risk of cyber attacks due to the increased connectivity and reliance on technology for automating navigational functions. On the other hand, the presence of passengers without crew members imposes a safety risk factor in cyber attacks. In this paper, we propose a new cyber risk management approach for managing the cyber risks against cyber physical systems in general and Autonomous Passenger Ships in particular. Our proposed approach aims to improve the Defense-in-Depth risk management strategy with additional components from the Threat-Informed Defense strategy allowing for more evolved cyber risk management capabilities. Moreover, we have utilized the proposed cyber risk management approach for the proposition of a cybersecurity architecture for managing the cyber risks against an APS use case named milliAmpere2. Additionally, we present our results after conducting a Systematic Literature Review (SLR) in cybersecurity evaluation in the maritime domain. Then, the findings of the SLR were utilized for a suitable evaluation of the proposed risk management approach. Our findings suggest that our proposed risk management approach named Threat-Informed Defense-in-Depth is capable of enriching several risk management activities across different stages in the system development life cycle. Additionally, a comprehensive evaluation of the cybersecurity posture of milliAmpere2 has been conducted using several approaches including risk evaluation, simulation, checklist, and adversary emulation. Our evaluation has uncovered several limitations in the current cybersecurity posture and proposed actions for improvement.
引用
收藏
页码:249 / 288
页数:40
相关论文
共 6 条
  • [1] Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth
    Ahmed Amro
    Vasileios Gkioulos
    International Journal of Information Security, 2023, 22 : 249 - 288
  • [2] A risk informed defense-in-depth framework for existing and advanced reactors
    Fleming, KN
    Silady, FA
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2002, 78 (03) : 205 - 225
  • [3] RISK-INFORMED DEFENSE-IN-DEPTH STRATRGY FOR NUCLEAR POWER PLANT
    Liu, Qianwen
    Wu, Yuxiang
    Wang, Yuhan
    PROCEEDINGS OF 2024 31ST INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, VOL 10, ICONE31 2024, 2024,
  • [4] RISK-INFORMED AND DEFENSE-IN-DEPTH ORIENTED PLANT DESIGN APPROACH
    Morota, Hidetsugu
    Suzuki, Hiroshi
    Sakihama, Takashi
    Nasif, Hesham R.
    Sano, Hiroshi
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING AND THE ASME 2012 POWER CONFERENCE - 2012, VOL 2, 2012, : 407 - 422
  • [5] DEFENSE-IN-DEPTH APPROACH FOR USE IN A RISK-INFORMED, TECHNOLOGY-NEUTRAL DESIGN AND LICENSING FRAMEWORK FOR NEW NUCLEAR PLANTS
    Chapman, Jim
    Hess, Stephen M.
    ICONE17, VOL 4, 2009, : 55 - 63
  • [6] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
    Tosh, Deepak K.
    Shetty, Sachin
    Sengupta, Shamik
    Kesan, Jay P.
    Kamhoua, Charles A.
    GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164