Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cyber Risk" wg kryterium: Temat


Tytuł:
The cyber-insurance market in Poland and determinants of its development from the insurance broker’s perspective
Autorzy:
Strupczewski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/943172.pdf
Data publikacji:
2017-06-30
Wydawca:
Uniwersytet Ekonomiczny w Poznaniu
Tematy:
cyber-risk
cyber-insurance
Polska
data breach
risk management
Opis:
The aim of the paper is to analyze the state of the cyber-insurance market in Poland, and additionally the identification of key determinants of its development, including such issues as cyber-risk perception and the insurability of cyber-risk. Due to the lack of comprehensive, cross-industry insurance data on cyber-insurance, I decided to collect raw data through my own, computer-aided survey amongst insurance brokers operating in Poland. By conducting the survey amongst insurance brokers it was possible not only to collect data describing the state of Polish cyber-insurance market but also to use their expert opinion on various issues relating to cyber-risk. The research presented here is a pioneer in terms of analysis of a cyber-insurance market in a post-communist country such as Poland which is the most important emerging market in the CEE region as well. My paper makes the research perspective broader as most cyber-insurance industry reports have focused ing on the US, the UK or the developed countries of Western Europe.
Źródło:
Economics and Business Review; 2017, 3(17), 2; 33-50
2392-1641
Pojawia się w:
Economics and Business Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The concept of cyber insurance and its role in the ISO-based risk management process: An industrial perspective
Autorzy:
Strupczewski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/20311612.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyber insurance
risk management
ISO 27000
ISO 31000
Opis:
With cyber threats rapidly growing, cyber risk insurance is emerging as a solution that can complement traditional cyber security tools based on technical and organizational measures. Moreover, the well-established risk management standards, such as ISO 31000 and ISO 27000, identify cyber insurance as having an important role to play in financing the negative impact of cyber risk. Accordingly, the purpose of this paper is to present the concept of cyber insurance and its key features, such as scope of coverage, areas of application, underwriting and premium calculation principles. The analysis is focused on industrial enterprises, which in many cases belong to the state’s critical infrastructure. They face not only pure cyber risk, but also cyber-physical risk, which means particularly high severity of potential losses. This study can have practical value in the context of requirements of the new NIS 2 Directive.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 363-383
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Real-time hierarchical predictive risk assessment at the national level: Mutually agreed predicted service disruption profiles
Autorzy:
Malinowski, Krzysztof
Karbowski, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/330654.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
risk assessment
cyber security
hierarchical approach
service disruption profile
coordination mechanism
szacowanie ryzyka
bezpieczeństwo cyfrowe
podejście hierarchiczne
Opis:
We present a real-time hierarchical approach to an on-line risk assessment at the national level taking into account both local risk analyses performed by key service operators and relevant interdependencies between those services. For this purpose we define mutually agreed predicted service disruption profiles and then propose a coordination mechanism to align those profiles. A simple, four-entity example is provided to illustrate the coordination.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2020, 30, 3; 597-609
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Raising awareness on cyber security of ECDIS
Autorzy:
Svilicic, B.
Brčić, D.
Žuškin, S.
Kalebić, D.
Powiązania:
https://bibliotekanauki.pl/articles/117444.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
risk analysis
ECDIS
ECDIS software
ECDIS cyber security
critical operational technology
ECDIS backup
ECDIS cyber threats
Opis:
In the maritime transport, the Electronic Chart Display and Information System (ECDIS) has been developed into a complex computer-based ship critical operational technology system, playing central roles in the safe ship navigation and transport. While ECDIS software maintenance is regulated by the International Maritime Organization (IMO) ECDIS performance standards and related circulars, underlying software and hardware arrangements are implemented by ship-owners and supported by ECDIS equipment manufacturers. In this paper, we estimate ECDIS cyber security in order to study the origin of ECDIS cyber security risks. A set of ECDIS systems is examined using an industry-leading vulnerability scanning software tool, and cyber threats regarding the ECDIS backup arrangement, underlying operating system and third party applications are studied.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2019, 13, 1; 231-236
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parental Technology Governance: Teenagers’ Understandings and Responses to Parental Digital Mediation
Autorzy:
Adorjan, Michael
Ricciardelli, Rosemary
Saleh, Tina
Powiązania:
https://bibliotekanauki.pl/articles/2106792.pdf
Data publikacji:
2022-04-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
Digital Parenting
Parental Online Governance and Mediation
Information Communications Technologies
Youth and Teenagers
Cyber Risk
Opis:
Research on parental mediation of children’s online engagements situate historically longstanding anxieties within the dynamics of present-day information communications technologies (i.e., concerns over new “cyber risks,” as well as opportunities). Yet, there remains a lack of emphasis on children’s reactions to and experiences with parental strategies and responses. In the current article, we highlight research involving semi-structured focus groups (n=35) with Canadian teenagers (n=115). We highlight themes directly related to parental digital mediation, including the role of ICTs in driving addictive behaviors, social connection, differences in parental responses between sons and daughters, and differences concerning age and birth order. Disrupting cultural discourses of young people who lack agency in relation to their use of ICTs, our discussions with teens reveal qualified support, even degrees of sympathy, for parental efforts to restrict access and use of digital technologies, but illuminate multifaceted reasons for resistance: their vital role not only for social connection but access to crucial information and knowledge.
Źródło:
Qualitative Sociology Review; 2022, 18, 2; 112-130
1733-8077
Pojawia się w:
Qualitative Sociology Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
OPSEC Model and Applications
Autorzy:
Akman, M. Kubilay
Powiązania:
https://bibliotekanauki.pl/articles/1835821.pdf
Data publikacji:
2018-08-23
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
OPSEC
security studies
sociology of security
security management
information security
cyber security
risk society
Opis:
OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army’s operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles, steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.
Źródło:
Security Dimensions; 2018, 25(25); 60-81
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mitigating Cyber Risk in Personal Finance of the Elderly. Insights into Vulnerabilities, Cyber Hygiene and the Role of Personal Cyber Insurance
Autorzy:
Strupczewski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/31342006.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyber risk
cyber threats to the elderly
cyber hygiene
personal cyber insurance
Opis:
The paper investigates the growing cyber threats to personal finance, faced by the elderly in the digital age. It begins by acknowledging the surge in cyber incidents, particularly impacting seniors amid their increasing engagement in the digital space. The research explores the theoretical background of individual attitudes towards cybersecurity, emphasizing the unique vulnerabilities of the elderly population and their heightened susceptibility to cyber threats. It offers practical recommendations for personal cyber hygiene. Moreover, it introduces personal cyber insurance (PCI) and discusses its advantages and challenges. As the main contribution to the body of knowledge, the study provides a comprehensive understanding of the specific challenges faced by the elderly in the digital realm. It offers practical strategies for risk mitigation and introduces PCI as a means of enhancing resilience. It also sets the groundwork for further exploration and targeted strategies to protect individuals, especially older adults, in the dynamic landscape of cybersecurity.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 281-298
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Instrument design for cyber risk assessment in insurability verification
Projektowanie instrumentów przeznaczonych do oceny zagrożenia ryzyka cybernetycznego w weryfikacji ubezpieczalności
Autorzy:
Bartolini, D. N.
Ahrens, A.
Zascerinska, J.
Powiązania:
https://bibliotekanauki.pl/articles/408201.pdf
Data publikacji:
2018
Wydawca:
Politechnika Lubelska. Wydawnictwo Politechniki Lubelskiej
Tematy:
cyber risk management
cyber insurance
information security
data protection
zarządzenie ryzykiem cybernetycznym
ubezpieczenie cybernetyczne
bezpieczeństwo informacji
ochrona danych
Opis:
Cyber risk assessment for insurability verification has been paid a lot of research interest as cyber insurance represents a new dynamic segment of market with considerable growth potential for insurers. As customer’s practices and processes consistently lead to the final overall result, customer's behaviour has to be described in detail. The aim of the present paper is to design an instrument (questionnaire) for customer’s cyber risk assessment in insurability verification. The method for building an instrument (questionnaire) is empirical research. Empirical research is based on use of empirical evidence. A questionnaire with 11 questions is proposed.
Ocena ryzyka związana z bezpieczeństwem cybernetycznym jest przedmiotem dużego zainteresowania badawczego, ze względu na to, że bezpieczeństwo cybernetyczne stanowi nowy, dynamiczny segment rynku o znacznym potencjale wzrostu dla ubezpieczycieli. Ponieważ praktyki i procesy klienta w ciągły sposób wpływają na końcową ocenę, zachowanie klienta musi być szczegółowo opisane. Celem niniejszego artykułu jest opracowanie instrumentu (kwestionariusza) do oceny ryzyka cybernetycznego klienta w ramach weryfikacji ubezpieczenia. Metoda budowy instrumentu (kwestionariusz) to badania empiryczne. Badania empiryczne opierają się na wykorzystaniu dowodów empirycznych. Zaproponowano kwestionariusz składający się z 11 pytań.
Źródło:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; 2018, 8, 3; 7-10
2083-0157
2391-6761
Pojawia się w:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
Autorzy:
Kosmowski, Kazimierz, T.
Gołębiewski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2068692.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
cyber security
hazardous plants
oil port infrastructure
industrial automation
control systems
hazards
threats
vulnerabilities
risk analysis
key performance indicators
integrated safety
security management
business continuity management
insurance
Opis:
This report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer, interested in decreasing risks to be insured, offers the expertise how to limit effectively risks in life cycle from the design conceptual stage of hazardous plant, through its reliable and safe operation, until decommissioning. Therefore, the risk evaluation model for insurance related decision making for the period considered, e.g. one year, should be plant specific with some predictive properties due to changing environment and business conditions, and usually considerable uncertainty involved. The objective is to evaluate and mitigate risks, and control them proactively, through undertaking appropriate activities within a process based management system according to elaborated policy and strategy that includes organisational and technical aspects, including preventive maintenance activities of sensitive equipment and updating in time the training programmes. Careful evaluating and controlling risks is also crucial for the insurance company. Basic activities of the risk engineers and underwriters in the insurance process are outlined in the context of identified hazards/threats and defined factors that significantly influence risks to be considered in evaluating the insurance premium in the context of terms and conditions specified.
Źródło:
Journal of Polish Safety and Reliability Association; 2019, 10, 1; 99--126
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ethical considerations in maritime cybersecurity research
Autorzy:
Oruc, A.
Powiązania:
https://bibliotekanauki.pl/articles/2172503.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
cyber security
maritime cyber security research
cyber risk
ethical considerations
ethical dilemmas
ethical principles
ethical conflicts
Opis:
Maritime transportation, an essential component of world trade, is performed by contemporary vessels. Despite the improvements that rapid advances in technology have brought to vessels’ operational efficiency and capability for safe navigation, the cyber risks associated with modern systems have increased apace. Widespread publicity regarding cyber incidents onboard ships has sparked extensive research on the part of universities, industry, and governmental organisations seeking to understand cyber risks. Consequently, researchers have discovered and disclosed an increasing number of threats and vulnerabilities in this context, providing information that in itself may pose a threat when accessed by the wrong parties. Thus, this paper aims to raise researchers’ awareness of ethical concerns and provide guidance for sound decision-making in areas where the research process must be handled carefully to avoid harm. To this end, this paper presents a literature review that explores the ethical issues involved in maritime cybersecurity research and provides specific examples to promote further understanding. Six ethical principles and four categories of ethical dilemmas are discussed. Finally, the paper offers recommendations that can guide researchers in dealing with any ethical conflicts that may arise while studying maritime cybersecurity.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 309--318
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Autorzy:
Heering, D.
Powiązania:
https://bibliotekanauki.pl/articles/117518.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
cybersecurity in shipping
Estonian shipowners
cyber attack
cyber incidents
cyber threats
MET System in Estonia
cyber risk
Opis:
Ships, ports and offshore facilities are increasingly becoming dependent on modern information and opera-tional technology. Cyber incidents on ships can create disruptions of critical systems that cause problems for the ship’s safe operation. Therefore, the shipowners must be prepared to cope with rising cyber threats. In or-der to prevent cyber incidents happening on ships and in the companies, essential steps must be taken on the management level. This paper introduces results of two surveys on cybersecurity and cyber awareness carried out in between 2017 – 2019 among the shipping companies operating in Estonia. Feedback was received from 12 shipowners out of 19 and the results show that at least 7 organisations had been the victims to different types of cyberattacks. The results indicate that shipowners are not paying enough of attention to potential cyber threats and education of their employees. Finally, the paper proposes cyber risk mitigation means for the shipowners.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2020, 14, 2; 271-278
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Effective information system and organisational efficiency
Skuteczny system informacyjny i efektywność organizacyjna
Autorzy:
Rahiman, Habeeb Ur
Nawaz, Nishad
Kodikal, Rashmi
Hariharasudan, A.
Powiązania:
https://bibliotekanauki.pl/articles/27315227.pdf
Data publikacji:
2021
Wydawca:
Politechnika Częstochowska
Tematy:
cyber security
internet of thinking
cyber risk
social engineering
India
MENA
cyberbezpieczeństwo
internet myślenia
cyberryzyko
socjotechnika
Indie
Opis:
The present study aims to identify the effectiveness of information systems on organizational efficiency in technical and operational perspectives in the various public and private sectors. The novelty of the research focuses on data security practices, perceived severity, response efficacy, perceived usefulness and perceived behavioral control on organisational effectiveness. The survey data is gathered from 200 professionals representing public and private sectors in India and MENA countries who broadly support these outcomes. The analysis of data was generated by applying an equation model and various descriptive statistical tools using AMOS and SPSS. The study results reveal that an effective information system with comprehensive information management avoids potential cyber-attacks and enhances the organisation’s performance. The study identified that repeated cyberattacks threaten the reputation of the business and its organizational operations. Therefore, creating effective awareness about risks and challenges on business operation among the workforce enhances the performance and efficiency of the organization. This empirical research has contributed significantly for organizations to emphasize suitable measures to incorporate effective information and risk mitigation plan to protect data and efficiency. The research outcome emphasized that training and awareness are mediating variables to enhance performance.
Niniejsze badanie ma na celu określenie skuteczności systemów informatycznych w zakresie sprawności organizacyjnej w perspektywach technicznych i operacyjnych w różnych sektorach publicznym i prywatnym. Nowość badania koncentruje się na praktykach w zakresie bezpieczeństwa danych, postrzeganej dotkliwości, skuteczności reakcji, postrzeganej użyteczności i postrzeganej kontroli behawioralnej nad efektywnością organizacji. Dane ankietowe zostały zebrane od 200 specjalistów reprezentujących sektor publiczny i prywatny w Indiach i krajach MENA, którzy szeroko popierają te wyniki. Analiza danych została wygenerowana przez zastosowanie modelu równania i różnych opisowych narzędzi statystycznych przy użyciu AMOS i SPSS. Wyniki badania pokazują, że skuteczny system informacyjny z kompleksowym zarządzaniem informacją pozwala uniknąć potencjalnych cyberataków i poprawia wydajność organizacji. Badanie wykazało, że powtarzające się cyberataki zagrażają reputacji firmy i jej działaniom organizacyjnym. Dlatego budowanie wśród pracowników skutecznej świadomości na temat zagrożeń i wyzwań związanych z działalnością biznesową zwiększa wydajność i efektywność organizacji. To badanie empiryczne w znacznym stopniu przyczyniło się do podkreślenia przez organizacje odpowiednich środków w celu włączenia skutecznych informacji i planu łagodzenia ryzyka w celu ochrony danych i wydajności. Wyniki badań podkreślają, że szkolenie i świadomość są zmiennymi pośredniczącymi w zwiększaniu wydajności.
Źródło:
Polish Journal of Management Studies; 2021, 24, 2; 398--413
2081-7452
Pojawia się w:
Polish Journal of Management Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity Risk Analysis and Threat Assessment Within Smart Electrical Power Distribution Grids
Autorzy:
Czechowski, R.
Powiązania:
https://bibliotekanauki.pl/articles/410579.pdf
Data publikacji:
2016
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
smart power grid
digital security
risk analysis
hazard valuation
cyber-physical security
Opis:
Development Of Electrical Power Systems And Their Integration With An Increasing Number Of Smart Automation Devices Compel To Undertake A New Approach To The Issue Of The System’s Security. Reliability Of An Electrical Power System And High Service Availability Are The Essential Characteristics Of Efficient Strategic Electricity Customers, I.E.: Large Industrial Facilities, Railway Transport, Medical Service Providers And Life-Saving Institutions. The Time Of Manual Or Automatic System Recovery After A Failure, Which Increases Its Security, Is Not Without Significance, Either. The Article Discusses The Issues Of Risk Assessment And Management, Including The Overall Process Of Analysis And Assessment Of Threat Probability In Electrical Power Systems.
Źródło:
Present Problems of Power System Control; 2016, 7; 19-28
2084-2201
Pojawia się w:
Present Problems of Power System Control
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity and cyber risk in integrated and management reports of key service operators
Autorzy:
Ferens, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/1917428.pdf
Data publikacji:
2021-06-21
Wydawca:
Stowarzyszenie Księgowych w Polsce
Tematy:
cybersecurity
cyber risk
business model
IT security
Opis:
Purpose: The scope of interactive information processed and exchanged through cyberspace has grown exponentially. Therefore, there is a need to develop cybersecurity that protects this space against both internal and external threats, as well as to work out an appropriate reporting system on the cybersecurity model operating in the company. The aim of the paper is to identify and assess the disclosures on cybersecurity and cyber risk in the integrated and management reports of selected companies listed on the Warsaw Stock Exchange. Methodology: The study focused on the integrated and management reports of 17 selected companies identified as operators of so-called key services. The representative sample was chosen through purposive sampling. This process was preceded by a preliminary analysis of companies listed in the WIG 30 Index, drawing on the number of integrated reports prepared by the operators of key services. The research involved an analysis of the literature and legal regulations, as well as the structure and scope of information on cybersecurity reported by the surveyed companies, along with the deductive method. The results of the analysis showed that only some companies present information on existing cyber risks and cybersecurity, while information is scattered in different parts of the business reports and non-comparable due to the lack of a unified data structure. It was noted that the reports do not contain detailed information on the activities in the field of cybersecurity, which makes it impossible to perform a multifaceted and multisectoral assessment of the results reported by the entities. Originality: The paper builds on and thus complements the scientific achievements in the field of non-financial reporting, including the business model, by identifying the shortcomings related to reporting on how to protect companies against the risk related to cyber threats in the reports to date. The study also confirms the need to improve the content of business reports with quantitative and qualitative information in this regard
Źródło:
Zeszyty Teoretyczne Rachunkowości; 2021, 45(2); 31-50
1641-4381
2391-677X
Pojawia się w:
Zeszyty Teoretyczne Rachunkowości
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Commercial Maritime and Cyber Risk Management
Autorzy:
RANA, Akash
Powiązania:
https://bibliotekanauki.pl/articles/466223.pdf
Data publikacji:
2019
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
commercial maritime
cyber threat
cyber risk management
maritime security
security
Opis:
The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines.
Źródło:
Safety & Defense; 2019, 5, 1; 46-48
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies