Сб с 10 до 16
Издание на английском языке
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and vulnerabilities, as well as relevant risk management methodologies, by focusing on initiatives and efforts that attempt to deal with the risks and vulnerabilities of port Critical Information Infrastructures (CII) ecosystems. Modern commercial shipping ports are highly dependent on the operation of complex, dynamic ICT systems and ICT-based maritime supply chains, making these central points in the maritime supply chain vulnerable to cybersecurity threats. Identifies barriers and gaps in existing port and supply chain security standards, policies, legislation and regulatory frameworks. Identifies port threat scenarios and analyzes cascading effects in their supply chains. Analyzes risk assessment methodologies and tools, identifying their open problems when applied to a port’s CIIs.
Contents
List of Figures
List of Tables
Acknowledgments
General Security Glossary
Maritime Glossary
Executive Summary
1. Introduction
2. Ports' Critical Infrastructures
Maritime Environment The Role of Commercial Ports
Layers of the Ports’ ICT System
Security and Safety: Two Interrelated Concepts
Maritime Security Organizations
Security of Port Services
3. Security of Ports' Critical Information Infrastructures
Safety Management: A Restricting Approach
Cybersecurity Regulations and Standards
Security Management: A Holistic Approach
CIIP Methodologies
CYSM Risk Assessment Tool as a Best Practice
4. Maritime Supply Chain Risk Assessment (at Entity Level)
Supply Chain Graph Models
Medusa: A Maritime SCS Risk Assessment Methodology
The Medusa SCS Risk Assessment System
Validation Scenarios
5. Maritime Supply Chain Risk Assessment (at Asset Level)
Standards and Methods
MITIGATE Risk Assessment SCS Methodology at Asset Level
6. Conclusions and the Way Forward
Bibliography
Appendix A: CYSM Questionnaire for Ports' Security Awareness
Appendix B: Threat Analysis: An Example
Appendix C: Supply Chain Controls and Vulnerabilities
Index