Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cyber Risk" wg kryterium: Temat


Wyświetlanie 1-8 z 8
Tytuł:
An Operational Approach to Maritime Cyber Resilience
Autorzy:
Erstad, E.
Ostnes, R.
Lund, M. S.
Powiązania:
https://bibliotekanauki.pl/articles/1841562.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
maritime cyber resilience
cyber resilience
cyber attack
cyber risk
cyber risk managementm
maritime cyber security
maritime cyber emergency
Opis:
As a result of the last decades development of technology and increased connectivity of maritime vessels, the need for maritime cyber security is undoubtedly present. In 2017, IMO officially recognized “… the urgent need to raise awareness on cyber threats and vulnerabilities to support safe and secure shipping, which is operationally resilient to cyber risks”. Thus, Maritime Cyber Resilience is seen as key by IMO in the improvement of the maritime cyber security. It is assumed that human error is the cause of more than half successful cyber-attacks. If technology somehow fails, in example because of a cyber threat, the human is expected to handle the problem and provide a solution. It is therefore necessary to focus on the human aspect when considering maritime cyber threats. This paper aims to provide a working definition of “Maritime Cyber Resilience”. Further, the paper argues why the human should be a focus of study, as the human is at the sharp edge in a potential maritime cyber emergency.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 1; 27-34
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Autorzy:
Heering, D.
Powiązania:
https://bibliotekanauki.pl/articles/117518.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
cybersecurity in shipping
Estonian shipowners
cyber attack
cyber incidents
cyber threats
MET System in Estonia
cyber risk
Opis:
Ships, ports and offshore facilities are increasingly becoming dependent on modern information and opera-tional technology. Cyber incidents on ships can create disruptions of critical systems that cause problems for the ship’s safe operation. Therefore, the shipowners must be prepared to cope with rising cyber threats. In or-der to prevent cyber incidents happening on ships and in the companies, essential steps must be taken on the management level. This paper introduces results of two surveys on cybersecurity and cyber awareness carried out in between 2017 – 2019 among the shipping companies operating in Estonia. Feedback was received from 12 shipowners out of 19 and the results show that at least 7 organisations had been the victims to different types of cyberattacks. The results indicate that shipowners are not paying enough of attention to potential cyber threats and education of their employees. Finally, the paper proposes cyber risk mitigation means for the shipowners.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2020, 14, 2; 271-278
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ethical considerations in maritime cybersecurity research
Autorzy:
Oruc, A.
Powiązania:
https://bibliotekanauki.pl/articles/2172503.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
cyber security
maritime cyber security research
cyber risk
ethical considerations
ethical dilemmas
ethical principles
ethical conflicts
Opis:
Maritime transportation, an essential component of world trade, is performed by contemporary vessels. Despite the improvements that rapid advances in technology have brought to vessels’ operational efficiency and capability for safe navigation, the cyber risks associated with modern systems have increased apace. Widespread publicity regarding cyber incidents onboard ships has sparked extensive research on the part of universities, industry, and governmental organisations seeking to understand cyber risks. Consequently, researchers have discovered and disclosed an increasing number of threats and vulnerabilities in this context, providing information that in itself may pose a threat when accessed by the wrong parties. Thus, this paper aims to raise researchers’ awareness of ethical concerns and provide guidance for sound decision-making in areas where the research process must be handled carefully to avoid harm. To this end, this paper presents a literature review that explores the ethical issues involved in maritime cybersecurity research and provides specific examples to promote further understanding. Six ethical principles and four categories of ethical dilemmas are discussed. Finally, the paper offers recommendations that can guide researchers in dealing with any ethical conflicts that may arise while studying maritime cybersecurity.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 309--318
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Effective information system and organisational efficiency
Skuteczny system informacyjny i efektywność organizacyjna
Autorzy:
Rahiman, Habeeb Ur
Nawaz, Nishad
Kodikal, Rashmi
Hariharasudan, A.
Powiązania:
https://bibliotekanauki.pl/articles/27315227.pdf
Data publikacji:
2021
Wydawca:
Politechnika Częstochowska
Tematy:
cyber security
internet of thinking
cyber risk
social engineering
India
MENA
cyberbezpieczeństwo
internet myślenia
cyberryzyko
socjotechnika
Indie
Opis:
The present study aims to identify the effectiveness of information systems on organizational efficiency in technical and operational perspectives in the various public and private sectors. The novelty of the research focuses on data security practices, perceived severity, response efficacy, perceived usefulness and perceived behavioral control on organisational effectiveness. The survey data is gathered from 200 professionals representing public and private sectors in India and MENA countries who broadly support these outcomes. The analysis of data was generated by applying an equation model and various descriptive statistical tools using AMOS and SPSS. The study results reveal that an effective information system with comprehensive information management avoids potential cyber-attacks and enhances the organisation’s performance. The study identified that repeated cyberattacks threaten the reputation of the business and its organizational operations. Therefore, creating effective awareness about risks and challenges on business operation among the workforce enhances the performance and efficiency of the organization. This empirical research has contributed significantly for organizations to emphasize suitable measures to incorporate effective information and risk mitigation plan to protect data and efficiency. The research outcome emphasized that training and awareness are mediating variables to enhance performance.
Niniejsze badanie ma na celu określenie skuteczności systemów informatycznych w zakresie sprawności organizacyjnej w perspektywach technicznych i operacyjnych w różnych sektorach publicznym i prywatnym. Nowość badania koncentruje się na praktykach w zakresie bezpieczeństwa danych, postrzeganej dotkliwości, skuteczności reakcji, postrzeganej użyteczności i postrzeganej kontroli behawioralnej nad efektywnością organizacji. Dane ankietowe zostały zebrane od 200 specjalistów reprezentujących sektor publiczny i prywatny w Indiach i krajach MENA, którzy szeroko popierają te wyniki. Analiza danych została wygenerowana przez zastosowanie modelu równania i różnych opisowych narzędzi statystycznych przy użyciu AMOS i SPSS. Wyniki badania pokazują, że skuteczny system informacyjny z kompleksowym zarządzaniem informacją pozwala uniknąć potencjalnych cyberataków i poprawia wydajność organizacji. Badanie wykazało, że powtarzające się cyberataki zagrażają reputacji firmy i jej działaniom organizacyjnym. Dlatego budowanie wśród pracowników skutecznej świadomości na temat zagrożeń i wyzwań związanych z działalnością biznesową zwiększa wydajność i efektywność organizacji. To badanie empiryczne w znacznym stopniu przyczyniło się do podkreślenia przez organizacje odpowiednich środków w celu włączenia skutecznych informacji i planu łagodzenia ryzyka w celu ochrony danych i wydajności. Wyniki badań podkreślają, że szkolenie i świadomość są zmiennymi pośredniczącymi w zwiększaniu wydajności.
Źródło:
Polish Journal of Management Studies; 2021, 24, 2; 398--413
2081-7452
Pojawia się w:
Polish Journal of Management Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Raising awareness on cyber security of ECDIS
Autorzy:
Svilicic, B.
Brčić, D.
Žuškin, S.
Kalebić, D.
Powiązania:
https://bibliotekanauki.pl/articles/117444.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
risk analysis
ECDIS
ECDIS software
ECDIS cyber security
critical operational technology
ECDIS backup
ECDIS cyber threats
Opis:
In the maritime transport, the Electronic Chart Display and Information System (ECDIS) has been developed into a complex computer-based ship critical operational technology system, playing central roles in the safe ship navigation and transport. While ECDIS software maintenance is regulated by the International Maritime Organization (IMO) ECDIS performance standards and related circulars, underlying software and hardware arrangements are implemented by ship-owners and supported by ECDIS equipment manufacturers. In this paper, we estimate ECDIS cyber security in order to study the origin of ECDIS cyber security risks. A set of ECDIS systems is examined using an industry-leading vulnerability scanning software tool, and cyber threats regarding the ECDIS backup arrangement, underlying operating system and third party applications are studied.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2019, 13, 1; 231-236
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
OPSEC Model and Applications
Autorzy:
Akman, M. Kubilay
Powiązania:
https://bibliotekanauki.pl/articles/1835821.pdf
Data publikacji:
2018-08-23
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
OPSEC
security studies
sociology of security
security management
information security
cyber security
risk society
Opis:
OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army’s operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles, steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.
Źródło:
Security Dimensions; 2018, 25(25); 60-81
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Real-time hierarchical predictive risk assessment at the national level: Mutually agreed predicted service disruption profiles
Autorzy:
Malinowski, Krzysztof
Karbowski, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/330654.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
risk assessment
cyber security
hierarchical approach
service disruption profile
coordination mechanism
szacowanie ryzyka
bezpieczeństwo cyfrowe
podejście hierarchiczne
Opis:
We present a real-time hierarchical approach to an on-line risk assessment at the national level taking into account both local risk analyses performed by key service operators and relevant interdependencies between those services. For this purpose we define mutually agreed predicted service disruption profiles and then propose a coordination mechanism to align those profiles. A simple, four-entity example is provided to illustrate the coordination.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2020, 30, 3; 597-609
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
Autorzy:
Kosmowski, Kazimierz, T.
Gołębiewski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2068692.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
cyber security
hazardous plants
oil port infrastructure
industrial automation
control systems
hazards
threats
vulnerabilities
risk analysis
key performance indicators
integrated safety
security management
business continuity management
insurance
Opis:
This report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer, interested in decreasing risks to be insured, offers the expertise how to limit effectively risks in life cycle from the design conceptual stage of hazardous plant, through its reliable and safe operation, until decommissioning. Therefore, the risk evaluation model for insurance related decision making for the period considered, e.g. one year, should be plant specific with some predictive properties due to changing environment and business conditions, and usually considerable uncertainty involved. The objective is to evaluate and mitigate risks, and control them proactively, through undertaking appropriate activities within a process based management system according to elaborated policy and strategy that includes organisational and technical aspects, including preventive maintenance activities of sensitive equipment and updating in time the training programmes. Careful evaluating and controlling risks is also crucial for the insurance company. Basic activities of the risk engineers and underwriters in the insurance process are outlined in the context of identified hazards/threats and defined factors that significantly influence risks to be considered in evaluating the insurance premium in the context of terms and conditions specified.
Źródło:
Journal of Polish Safety and Reliability Association; 2019, 10, 1; 99--126
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-8 z 8

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies