|Publisher URL:||https://www.epubli.de/shop/buch/2000000069144||Title:||An adaptive supply chain cyber risk management methodology||Language:||English||Authors:||Schauer, Stefan
|Keywords:||IT security; cyber risk management; cyber risk assessment; maritime supply chains||Issue Date:||Oct-2017||Publisher:||epubli||Source:||Digitalization in supply chain management and logistics||Abstract (english):||
Maritime information infrastructures have developed to highly interrelated cyber ecosystems, where ports as well as their partners are connected in dynamic Information and Communication Technology (ICT)-based maritime supply chains.
This makes them open and vulnerable to the rapidly changing ICT threat landscape.
Hence, attacks on a seemingly isolated system of one business partner may propagate through the whole supply chain, causing cascading effects and resulting in large-scale impacts. In this article, we want to present a novel risk management methodology to assess the risk level of an entire maritime supply chain. This methodology builds upon publicly available information, well-defined mathematical approaches and best practices to automatically identify and assess vulnerabilities and potential threats of the involved cyber assets. This leads to a constantly updated risk evaluation of each business partner’s cyber assets together with their cyber interconnections with other business partners. The presented risk management methodology is based on qualitative risk scales, which makes the assessment as well as the results more intuitive. Furthermore, it enables a holistic view on all of the integrated ICT-systems as well as their interdependencies and thus can increase the security level of both a whole supply chain and every participating business partner.
|Conference:||Hamburg International Conference of Logistics (HICL) 2017||URI:||http://tubdok.tub.tuhh.de/handle/11420/1494||DOI:||10.15480/882.1491||ISBN:||9783745043280||ISSN:||2365-5070||Journal:||Proceedings of the Hamburg International Conference of Logistics (HICL)||Document Type:||Chapter/Article (Proceedings)||License:||CC BY-SA 4.0 (Attribution-ShareAlike 4.0)||Volume number:||23|
|Appears in Collections:||Publications with fulltext|
Show full item record
Files in This Item:
|schauer_stamer_bosse_pavlidis_mouratidis_könig_papastergiou_cyber_risk_management_hicl_2017.pdf||An Adaptive Supply Chain Cyber Risk Management Methodology||1,14 MB||Adobe PDF||View/Open|
checked on Sep 24, 2022
checked on Sep 24, 2022
Note about this record
Cite this record
This item is licensed under a Creative Commons License