Show simple item record

dc.contributor.authorSoner, O
dc.contributor.authorKayisoglu, G
dc.contributor.authorBolat, P
dc.contributor.authorTam, K
dc.date.accessioned2023-12-21T10:18:13Z
dc.date.available2023-12-21T10:18:13Z
dc.date.issued2023-12-21
dc.identifier.issn1879-1549
dc.identifier.issn1879-1549
dc.identifier.other103855
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/21826
dc.description.abstract

Given the increasing frequency and sophistication of methods and strategies employed in cyberattacks, cyber resilience has become a basic notion of cyber risk management. To be cyber-resilient against cyber risks, shipping companies must be proactive in establishing and implementing actions, constructing effective strategies, and adopting mitigation methods to strengthen their assets. However, shipping companies have only lately tended to fully recognize the necessity for a cybersecurity perspective to enable effective cyber risk management and mitigation of increasing cyberattacks. Aside from deficiencies in system design, integration, or maintenance, human factors are the prime weakness that potentially jeopardizes the ship's cybersecurity by simply making intentional or unintentional errors, revealing critical information, or generating entry points for attackers. Therefore, the current study aims to conduct a quantitative human risk assessment based on the SOHRA method, which is integrated with the NIST cybersecurity framework, to provide ships with the ability to be cyber resilient, and respond to and recover from cyber-attacks. The AIS has been considered for the research application not only because it is one of the most vulnerable systems on board a ship, but also because modifying and breaching the AIS data might have disastrous outcomes. The study results clearly indicate that the most likely error related to AIS cybersecurity risk occurs in the tasks defined under the "protect", "respond", "detect", "identify", and "recover" functions. Accordingly, suitable control and preventative measures have been developed to guarantee high-level cyber security for AIS and to provide cyber resilience and the structure for constructive decision-making by integrating various international standards, which include system security requirements and security levels for industrial communication networks, specifically with the IACS and NIST framework for the AIS cyber security.

dc.format.extent103855-103855
dc.languageen
dc.publisherElsevier
dc.subjectShip cyber security
dc.subjectCyber resilience
dc.subjectCyber risk management
dc.subjectAIS
dc.subjectHRA
dc.titleRisk sensitivity analysis of AIS cyber security through maritime cyber regulatory frameworks
dc.typejournal-article
dc.typeArticle
plymouth.volume142
plymouth.publisher-urlhttp://dx.doi.org/10.1016/j.apor.2023.103855
plymouth.publication-statusPublished
plymouth.journalApplied Ocean Research
dc.identifier.doi10.1016/j.apor.2023.103855
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
plymouth.organisational-group|Plymouth|REF 2028 Researchers by UoA
plymouth.organisational-group|Plymouth|REF 2028 Researchers by UoA|UoA11 Computer Science and Informatics
dcterms.dateAccepted2023-12-18
dc.date.updated2023-12-21T10:18:08Z
dc.rights.embargodate2024-12-20
dc.identifier.eissn1879-1549
rioxxterms.versionofrecord10.1016/j.apor.2023.103855


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV