Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

A Novel Framework for Maritime Security Assessments and its Applications on the Shipping Industry. Cyber security examples.

Papageorgiou, P (2022) A Novel Framework for Maritime Security Assessments and its Applications on the Shipping Industry. Cyber security examples. Other thesis, Liverpool John Moores University.

[img]
Preview
Text
2022papageorgioumphil.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial.

Download (3MB) | Preview

Abstract

Terrorism, piracy, robbery, cyber-threats on ships and port facilities, smuggling and drug trafficking through cargo and containers, etc., are some of the international security problems due to which the national maritime security services must provide solutions. Cyber-attack is considered particularly important due to the possibility to be combined with all the other security vulnerabilities in the shipping industry. It is clear that the maritime supply chain is particularly vulnerable to malicious acts resulting from criminal and terrorist elements. It is therefore necessary for the national maritime security services to take appropriate security measures in order to reduce the threats posed by these malicious elements. In fact there is no extensive and in-depth literature for the risk acceptance criteria concerning maritime security. Basic information is drawn from other areas, such as civil aviation. It is necessary to standardize these criteria, as is the case with the Formal Safety Assessment, where practitioners know how to gather information, to make comparisons with previous experience and to make decisions that are often based on experience from the past. Thus, the practice of security management in the maritime industry must be seen from a new perspective given the rapid changes that shipping is facing. The aim of the proposed study is to address the issue of maritime security through the development of a method applicable to the maritime industry that evaluates and manages security related risks and specifically maritime cyber risk. The main objectives of this study are: i) To critically analyse the existing maritime risk approaches. ii) To develop a method to address maritime cyber risk. iii) To illustrate through the application how this method could be used in practise. iv) To provide brief recommendation for future work. The proposed method uses the Bow-Tie diagram tool for the estimation of the risk. A risk computation procedure is described after the application of a set of prevention barriers, which is based mainly on the accuracy of the definition of the Probability Pi and the Contribution Ci of each Threat (i) as well as on the accuracy of the estimation of the Effectiveness value Eij, of each Prevention Barrier (j) for the same defined Threat (i), by the user. Similarly, the risk computation for each consequence, after the application of a set of mitigation barriers, is based mainly on the accuracy of the definition of the Risk Value RVi of each Consequence (i) as well as on the accuracy of the estimation of the Effectiveness value Eij, of each Mitigation Barrier (j) for the same defined Consequence (i), by the user. The results of the risk computation appear in the Bow-Tie diagram providing a coloured scheme of the obtained risk values for top event and consequences, after the introduction of the necessary prevention and mitigation barriers. The present work may be completed in the future, to perform cost benefit analysis, decision making procedures and training programmes.

Item Type: Thesis (Other)
Uncontrolled Keywords: Maritime Security; Cyber Security
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > T Technology (General)
T Technology > TA Engineering (General). Civil engineering (General)
V Naval Science > VM Naval architecture. Shipbuilding. Marine engineering
Divisions: Engineering
SWORD Depositor: A Symplectic
Date Deposited: 01 Jul 2022 10:19
Last Modified: 01 Jul 2022 10:20
DOI or ID number: 10.24377/LJMU.t.00017191
Supervisors: Kontovas, Christos
URI: https://researchonline.ljmu.ac.uk/id/eprint/17191
View Item View Item