Commercial Maritime and Cyber Risk Management
The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, includi...
Ausführliche Beschreibung
Autor*in: |
Akash RANA [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2019 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: Safety & Defense - Centrum Rzeczoznawstwa Budowlanego, 2020, 5(2019), 1 |
---|---|
Übergeordnetes Werk: |
volume:5 ; year:2019 ; number:1 |
Links: |
---|
DOI / URN: |
10.37105/sd.42 |
---|
Katalog-ID: |
DOAJ024387894 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ024387894 | ||
003 | DE-627 | ||
005 | 20230307074102.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230226s2019 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.37105/sd.42 |2 doi | |
035 | |a (DE-627)DOAJ024387894 | ||
035 | |a (DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 0 | |a Akash RANA |e verfasserin |4 aut | |
245 | 1 | 0 | |a Commercial Maritime and Cyber Risk Management |
264 | 1 | |c 2019 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. | ||
650 | 4 | |a commercial maritime | |
650 | 4 | |a cyber threat | |
650 | 4 | |a cyber risk management | |
650 | 4 | |a maritime security | |
650 | 4 | |a security | |
653 | 0 | |a Technology | |
653 | 0 | |a T | |
773 | 0 | 8 | |i In |t Safety & Defense |d Centrum Rzeczoznawstwa Budowlanego, 2020 |g 5(2019), 1 |w (DE-627)1760625191 |x 2450551X |7 nnns |
773 | 1 | 8 | |g volume:5 |g year:2019 |g number:1 |
856 | 4 | 0 | |u https://doi.org/10.37105/sd.42 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865 |z kostenfrei |
856 | 4 | 0 | |u https://sd-magazine.eu/index.php/sd/article/view/42 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2450-551X |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
951 | |a AR | ||
952 | |d 5 |j 2019 |e 1 |
author_variant |
a r ar |
---|---|
matchkey_str |
article:2450551X:2019----::omrilaiiencbrik |
hierarchy_sort_str |
2019 |
publishDate |
2019 |
allfields |
10.37105/sd.42 doi (DE-627)DOAJ024387894 (DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865 DE-627 ger DE-627 rakwb eng Akash RANA verfasserin aut Commercial Maritime and Cyber Risk Management 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. commercial maritime cyber threat cyber risk management maritime security security Technology T In Safety & Defense Centrum Rzeczoznawstwa Budowlanego, 2020 5(2019), 1 (DE-627)1760625191 2450551X nnns volume:5 year:2019 number:1 https://doi.org/10.37105/sd.42 kostenfrei https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865 kostenfrei https://sd-magazine.eu/index.php/sd/article/view/42 kostenfrei https://doaj.org/toc/2450-551X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 1 |
spelling |
10.37105/sd.42 doi (DE-627)DOAJ024387894 (DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865 DE-627 ger DE-627 rakwb eng Akash RANA verfasserin aut Commercial Maritime and Cyber Risk Management 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. commercial maritime cyber threat cyber risk management maritime security security Technology T In Safety & Defense Centrum Rzeczoznawstwa Budowlanego, 2020 5(2019), 1 (DE-627)1760625191 2450551X nnns volume:5 year:2019 number:1 https://doi.org/10.37105/sd.42 kostenfrei https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865 kostenfrei https://sd-magazine.eu/index.php/sd/article/view/42 kostenfrei https://doaj.org/toc/2450-551X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 1 |
allfields_unstemmed |
10.37105/sd.42 doi (DE-627)DOAJ024387894 (DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865 DE-627 ger DE-627 rakwb eng Akash RANA verfasserin aut Commercial Maritime and Cyber Risk Management 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. commercial maritime cyber threat cyber risk management maritime security security Technology T In Safety & Defense Centrum Rzeczoznawstwa Budowlanego, 2020 5(2019), 1 (DE-627)1760625191 2450551X nnns volume:5 year:2019 number:1 https://doi.org/10.37105/sd.42 kostenfrei https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865 kostenfrei https://sd-magazine.eu/index.php/sd/article/view/42 kostenfrei https://doaj.org/toc/2450-551X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 1 |
allfieldsGer |
10.37105/sd.42 doi (DE-627)DOAJ024387894 (DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865 DE-627 ger DE-627 rakwb eng Akash RANA verfasserin aut Commercial Maritime and Cyber Risk Management 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. commercial maritime cyber threat cyber risk management maritime security security Technology T In Safety & Defense Centrum Rzeczoznawstwa Budowlanego, 2020 5(2019), 1 (DE-627)1760625191 2450551X nnns volume:5 year:2019 number:1 https://doi.org/10.37105/sd.42 kostenfrei https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865 kostenfrei https://sd-magazine.eu/index.php/sd/article/view/42 kostenfrei https://doaj.org/toc/2450-551X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 1 |
allfieldsSound |
10.37105/sd.42 doi (DE-627)DOAJ024387894 (DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865 DE-627 ger DE-627 rakwb eng Akash RANA verfasserin aut Commercial Maritime and Cyber Risk Management 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. commercial maritime cyber threat cyber risk management maritime security security Technology T In Safety & Defense Centrum Rzeczoznawstwa Budowlanego, 2020 5(2019), 1 (DE-627)1760625191 2450551X nnns volume:5 year:2019 number:1 https://doi.org/10.37105/sd.42 kostenfrei https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865 kostenfrei https://sd-magazine.eu/index.php/sd/article/view/42 kostenfrei https://doaj.org/toc/2450-551X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 1 |
language |
English |
source |
In Safety & Defense 5(2019), 1 volume:5 year:2019 number:1 |
sourceStr |
In Safety & Defense 5(2019), 1 volume:5 year:2019 number:1 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
commercial maritime cyber threat cyber risk management maritime security security Technology T |
isfreeaccess_bool |
true |
container_title |
Safety & Defense |
authorswithroles_txt_mv |
Akash RANA @@aut@@ |
publishDateDaySort_date |
2019-01-01T00:00:00Z |
hierarchy_top_id |
1760625191 |
id |
DOAJ024387894 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ024387894</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230307074102.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230226s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.37105/sd.42</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ024387894</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Akash RANA</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Commercial Maritime and Cyber Risk Management</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">commercial maritime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cyber threat</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cyber risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">maritime security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Technology</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">T</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Safety & Defense</subfield><subfield code="d">Centrum Rzeczoznawstwa Budowlanego, 2020</subfield><subfield code="g">5(2019), 1</subfield><subfield code="w">(DE-627)1760625191</subfield><subfield code="x">2450551X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:5</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.37105/sd.42</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://sd-magazine.eu/index.php/sd/article/view/42</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2450-551X</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">5</subfield><subfield code="j">2019</subfield><subfield code="e">1</subfield></datafield></record></collection>
|
author |
Akash RANA |
spellingShingle |
Akash RANA misc commercial maritime misc cyber threat misc cyber risk management misc maritime security misc security misc Technology misc T Commercial Maritime and Cyber Risk Management |
authorStr |
Akash RANA |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)1760625191 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut |
collection |
DOAJ |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
2450551X |
topic_title |
Commercial Maritime and Cyber Risk Management commercial maritime cyber threat cyber risk management maritime security security |
topic |
misc commercial maritime misc cyber threat misc cyber risk management misc maritime security misc security misc Technology misc T |
topic_unstemmed |
misc commercial maritime misc cyber threat misc cyber risk management misc maritime security misc security misc Technology misc T |
topic_browse |
misc commercial maritime misc cyber threat misc cyber risk management misc maritime security misc security misc Technology misc T |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Safety & Defense |
hierarchy_parent_id |
1760625191 |
hierarchy_top_title |
Safety & Defense |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)1760625191 |
title |
Commercial Maritime and Cyber Risk Management |
ctrlnum |
(DE-627)DOAJ024387894 (DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865 |
title_full |
Commercial Maritime and Cyber Risk Management |
author_sort |
Akash RANA |
journal |
Safety & Defense |
journalStr |
Safety & Defense |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
txt |
author_browse |
Akash RANA |
container_volume |
5 |
format_se |
Elektronische Aufsätze |
author-letter |
Akash RANA |
doi_str_mv |
10.37105/sd.42 |
title_sort |
commercial maritime and cyber risk management |
title_auth |
Commercial Maritime and Cyber Risk Management |
abstract |
The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. |
abstractGer |
The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. |
abstract_unstemmed |
The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ |
container_issue |
1 |
title_short |
Commercial Maritime and Cyber Risk Management |
url |
https://doi.org/10.37105/sd.42 https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865 https://sd-magazine.eu/index.php/sd/article/view/42 https://doaj.org/toc/2450-551X |
remote_bool |
true |
ppnlink |
1760625191 |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.37105/sd.42 |
up_date |
2024-07-03T22:40:36.108Z |
_version_ |
1803599411790479360 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ024387894</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230307074102.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230226s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.37105/sd.42</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ024387894</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJc609ac1d005f4febb86d3e0dd84a4865</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Akash RANA</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Commercial Maritime and Cyber Risk Management</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">commercial maritime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cyber threat</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cyber risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">maritime security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Technology</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">T</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Safety & Defense</subfield><subfield code="d">Centrum Rzeczoznawstwa Budowlanego, 2020</subfield><subfield code="g">5(2019), 1</subfield><subfield code="w">(DE-627)1760625191</subfield><subfield code="x">2450551X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:5</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.37105/sd.42</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/c609ac1d005f4febb86d3e0dd84a4865</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://sd-magazine.eu/index.php/sd/article/view/42</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2450-551X</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">5</subfield><subfield code="j">2019</subfield><subfield code="e">1</subfield></datafield></record></collection>
|
score |
7.400646 |