Show simple item record

dc.contributor.authorTam, K
dc.contributor.authorMoara-Nkwe, K
dc.contributor.authorJones, Kevin
dc.date.accessioned2020-07-16T14:48:38Z
dc.date.available2020-07-16T14:48:38Z
dc.date.issued2020-07-15
dc.identifier.issn2651-205X
dc.identifier.issn2651-205X
dc.identifier.urihttp://hdl.handle.net/10026.1/16067
dc.description.abstract

<jats:p>A good defensive strategy against evolving cyber threats and cybercrimes is to raise awareness and use that awareness to prepare technical mitigation and human defence strategies.  A prime way to do this is through training.  While there are already many sectors employing this strategy (e.g., space, smart buildings, business IT) maritime has yet to take advantage of the available cyber-range technology to assess cyber-risks and create appropriate training to meet those risks.   Cyber security training can come in two forms, the first is so security professionals can raise their awareness on the latest and most urgent issues and increase defence skill levels.  The second form is directed at non-security professionals (e.g., ship builders, crew) and the general public, who are just as affected by cyber threats but may not have the necessary security background to deal with the issues.  Conducting training programmes for both requires dedicated computing infrastructure to simulate and execute effective scenarios for both sets of trainees.  To this end, a cyber range (CR) provides an environment for just that.  The purpose of this paper is to use studies on the concept of cyber ranges to provide evidence on why the maritime sector should embrace this technology for maritime-cyber training, and envision how they will provide maritime training and risk assessment to combat tomorrow’s threats.</jats:p>

dc.language.isoen
dc.publisherFaculty of International Maritime Studies
dc.titleThe Use of Cyber Ranges in the Maritime Context
dc.typejournal-article
plymouth.issue1
plymouth.volume3
plymouth.publication-statusPublished online
plymouth.journalMaritime Technology and Research
dc.identifier.doi10.33175/mtr.2021.241410
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2020-07-02
dc.rights.embargodate2020-7-21
dc.identifier.eissn2651-205X
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.33175/mtr.2021.241410
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2020-07-15
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV