The Challenges of Cyber Resilience in the Maritime Sector: Addressing the Weak Awareness of the Dangers Caused by Cyber Threats
Abstract
:1. Introduction
2. Background
- UR E26: Aims to ensure the secure integration of OT and IT equipment into the vessel’s network during the design, construction, commissioning, and operational life of the ship. It targets the ship as a collective entity for cyber resilience and covers equipment identification, protection, attack detection, response, and recovery.
- UR E27: Ensures system integrity is secured and hardened by third-party equipment suppliers. It provides requirements for the cyber resilience of onboard systems and equipment and includes additional requirements relating to the interface between users and computer-based systems onboard, as well as product design and development requirements for new devices before their implementation onboard ships.
- Carry out regular risk assessments, focusing on vulnerable IT and OT systems, with attention to legacy infrastructure still in operation;
- Introduce layered security controls such as access restrictions, network segmentation, and malware detection to limit potential entry points;
- Create and rehearse an incident response plan, assigning roles and establishing clear procedures for handling cyber events;
- Maintain secure backups, ideally with geographically separated storage to ensure recovery if systems are compromised;
- Invest in staff training, especially for operational teams who may be exposed to phishing or social engineering threats;
- Engage with external partners, including regulatory bodies and cybersecurity forums, to stay informed and improve coordination during incidents.
- Embedding cybersecurity into risk management and decision making, not treating it as a separate IT issue;
- Aligning cybersecurity goals with the organization’s overall strategy, so that protecting digital systems also supports business growth;
- Assigning clear responsibilities for cybersecurity roles, both technical and non-technical;
- Using a risk-based approach to focus protection efforts on systems that matter most—like navigation, cargo tracking, and communication networks;
- Creating a culture of cybersecurity, where everyone in the organization—from operators to executives—understands the risk and knows how to reduce them;
- Collaborating with external stakeholders, including government agencies, industry bodies, and supply-chain partners;
- Investing in people by building a skilled workforce that can manage both current and future cyber threats.
3. Tools and Methodology
4. Results and Discussion
5. Research Gaps and Future Directions
6. Conclusions
- The identification of cyber-related assets and services in a systematic manner that includes maintaining asset inventory, identifying dependencies, and implementing automation;
- Adopting a comprehensive approach for identifying and assessing cyber risks that includes cyber-threat intelligence (CTI), risk indicators, and business impact analysis, involves all relevant stakeholders, and is integrated at the organizational level;
- Prioritizing the implementation of security measures in accordance with a risk-based approach that takes into account the effectiveness of security measures and relevance to identified risks, based on a security-by-design approach;
- The implementation of an awareness-raising program on cybersecurity and the importance of technical training at the level of the entire organization;
- The development of a comprehensive cybersecurity program that includes senior management commitment;
- Conducting cybersecurity maturity self-assessments to determine priorities for improvement and allocation of budget and resources.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
EDR | Endpoint Detection and Response |
IDS | Intrusion Detection System |
IPS | Intrusion Prevention System |
SIEM | Security Information and Event Management |
SOAR | Security Orchestration, Automation and Response |
SOC | Security Operations Center |
XDR | Extended Detection and Response |
References
- Hirata, E.; Watanabe, D.; Lambrou, M. Shipping Digitalization and Automation for the Smart Port. In Supply Chain Recent Advances and New Perspectives in the Industry 4.0 Era; IntechOpen: London, UK, 2022. [Google Scholar] [CrossRef]
- MacKinnon, S.N.; Weber, R.; Lundh, M. The rise of digitalisation and automation in the shipping industry and their impacts on training and system safety. S. Afr. J. Marit. Educ. Train. 2023, 2, 83–96. [Google Scholar] [CrossRef]
- Korniyenko, O. Trends of digital technologies in maritime management. Екoнoміка та Управління Націoнальним Гoспoдарствoм 2023, 81, 51–56. [Google Scholar] [CrossRef]
- Rusinov, I.A.; Gavrilova, I.A.; Uami, A. Digitalization and the future of the ship broker. Научнoе Обoзрение: Теoрия И Практика 2020, 10, 1885–1893. [Google Scholar] [CrossRef]
- Karunasena, C.; Widyalankara, R.C.; Sedrick, P.; Disanayaka, S.M.; Perera, H.; Medagama, P. Optimization of Digital Transformation in Shipping. In Proceedings of the OCEANS 2022—Chennai, Chennai, India, 21–24 February 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Kastelan, N.; Vidan, P.; Assani, N.; Miličević, M. Digital Horizon: Assessing Current Status of Digitalization in Maritime Industry. Trans. Marit. Sci. 2024, 13, 316753. [Google Scholar] [CrossRef]
- Alcaide, J.I.; Llave, R.G. Critical infrastructures cybersecurity and the maritime sector. Transp. Res. Procedia 2020, 45, 547–554. [Google Scholar] [CrossRef]
- Akpan, F.; Bendiab, G.; Shiaeles, S.; Karamperidis, S.; Michaloliakos, M. Cybersecurity Challenges in the Maritime Sector. Network 2022, 2, 123–138. [Google Scholar] [CrossRef]
- Gu, Y.; Goez, J.C.; Guajardo, M.; Wallace, S.W. Autonomous vessels: State of the art and potential opportunities in logistics. Int. Trans. Oper. Res. 2021, 28, 1706–1739. [Google Scholar] [CrossRef]
- Gu, Y.; Wallace, S.W. Operational benefits of autonomous vessels in logistics—A case of autonomous water-taxis in Bergen. Transp. Res. Part E Logist. Transp. Rev. 2021, 154, 102456. [Google Scholar] [CrossRef]
- Negenborn, R.R.; Goerlandt, F.; Johansen, T.A.; Slaets, P.; Valdez, O.A.; Vanelslander, T.; Ventikos, N.P. Autonomous ships are on the horizon: Here’s what we need to know. Nature 2023, 615, 30–33. [Google Scholar] [CrossRef] [PubMed]
- Sun, Z.; Ni, T.; Yang, H.; Liu, K.; Zhang, Y.; Gu, T.; Xu, W. FLoRa: Energy-efficient, reliable, and beamforming-assisted over-the-air firmware update in LoRa networks. In Proceedings of the 22nd International Conference on Information Processing in Sensor Networks, San Antonio, TX, USA, 9–12 May 2023; pp. 14–26. [Google Scholar]
- Sun, Z.; Ni, T.; Yang, H.; Liu, K.; Zhang, Y.; Gu, T.; Xu, W. Flora+: Energy-efficient, reliable, beamforming-assisted, and secure over-the-air firmware update in lora networks. ACM Trans. Sens. Netw. 2024, 20, 1–28. [Google Scholar] [CrossRef]
- Karas, A. Maritime Industry Cybersecurity: A Review of Contemporary Threats. Eur. Res. Stud. J. 2023, XXVI, 921–930. [Google Scholar] [CrossRef]
- Kavallieratos, G.; Katsikas, S.; Gkioulos, V. Cyberattacks against the autonomous ship. In Computer Security; Springer: Berlin/Heidelberg, Germany, 2018; pp. 20–36. [Google Scholar] [CrossRef]
- IBM. Data Breach Action Guide. Available online: https://www.ibm.com/reports/data-breach-action-guide (accessed on 1 June 2024).
- Maersk’s Cargo Operations Hit Hard by Cyberattack. Available online: https://www.maritime-executive.com/article/maersks-cargo-operations-hit-hard-by-cyberattack (accessed on 1 June 2024).
- IMO and CMA CGM Work to Recover from Cyberattacks. Available online: https://www.maritime-executive.com/article/imo-and-cma-cgm-work-to-recover-from-cyber-attacks (accessed on 1 June 2024).
- Cosco Reports Cyberattack at Its U.S. Operations. Available online: https://www.maritime-executive.com/article/cosco-reports-cyberattack-at-its-u-s-operations (accessed on 1 June 2024).
- Meland, P.H.; Bernsmed, K.; Wille, E.; Rødseth, Ø.J.; Nesheim, D.A. A Retrospective Analysis of Maritime Cyber Security Incidents. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2021, 15, 519–530. [Google Scholar] [CrossRef]
- X.com. X (Formerly Twitter). Available online: https://x.com/H4ckManac/status/1864945385375940903 (accessed on 1 January 2025).
- IMO. Guidelines on Maritime Cyber Risk Management. MSC-FAL.1-Circ.3-Rev.2. Available online: https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/MSC-FAL.1-Circ.3-Rev.2%20-%20Guidelines%20On%20Maritime%20Cyber%20Risk%20Management%20(Secretariat).pdf (accessed on 1 June 2024).
- IMO. Maritime Cyber Risk Management in Safety Management Systems. Resolution MSC.428(98). Available online: https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/Resolution MSC.428(98).pdf (accessed on 1 June 2024).
- ENISA (europa.eu). Guidelines—Cyber Risk Management for Ports. Available online: https://www.enisa.europa.eu/publications/guidelines-cyber-risk-management-for-ports?v2=1 (accessed on 1 June 2024).
- NIS2 Directive: New Rules on Cybersecurity of Network and INFORMATION SYSTEMS. Shaping Europe’s Digital Future. Available online: https://digital-strategy.ec.europa.eu/en/policies/nis2-directive (accessed on 3 April 2025).
- Uredba o Kibernetičkoj Sigurnosti. Available online: https://narodne-novine.nn.hr/clanci/sluzbeni/2024_11_135_2217.html (accessed on 3 April 2025).
- PricewaterhouseCoopers. New European NIS2 Directive: Stricter Requirements for Cyber Security. PwC. Available online: https://pwc.to/3vMm1rh (accessed on 3 April 2025).
- Guidelines on Cyber Security on Board Ships (Ver. 4). Available online: https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/ANNEX Guidelines on Cyber Security Onboard Ships v.4.pdf (accessed on 1 June 2024).
- Recommendation on Cyber Resilience—IACS. Available online: https://www.steamshipmutual.com/sites/default/files/downloads/articles/2020/IACS-Recommendation-on-Cyber-resilience-No-166-2020_04.pdf (accessed on 1 June 2024).
- Safer and Cleaner Shipping—IACS. Available online: https://iacs.org.uk/news/iacs-adopts-new-requirements-on-cyber-safety/ (accessed on 1 June 2024).
- ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—Requirements. Available online: https://www.iso.org/standard/27001 (accessed on 1 June 2024).
- NIST. Cybersecurity Framework. Available online: https://www.nist.gov/cyberframework (accessed on 1 June 2024).
- Port of Los Angeles—Cyber Resilience Center—World Port Sustainability Program. Available online: https://sustainableworldports.org/project/port-of-los-angeles-cyber-resilience-center/ (accessed on 5 April 2025).
- Rahman, S.R. Dutch Seaports, FERM Unveil Nationwide Cybersecurity Platform. Port Technology International. 11 December 2024. Available online: https://www.porttechnology.org/news/dutch-seaports-ferm-unveil-nationwide-cybersecurity-platform/ (accessed on 5 April 2025).
- O’Dwyer, R. Maritime Cybersecurity Operations Centre Opens in Singapore. Smart Maritime Network. 16 May 2019. Available online: https://smartmaritimenetwork.com/2019/05/16/maritime-cybersecurity-operations-centre-opens-in-singapore/ (accessed on 5 April 2025).
- Swinhoe, D. Rebuilding After NotPetya: How Maersk Moved Forward. CSO Online. 9 October 2019. Available online: https://www.csoonline.com/article/567845/rebuilding-after-notpetya-how-maersk-moved-forward.html (accessed on 5 April 2025).
- Nganga, A.; Scanlan, J.; Lützhöft, M.; Mallam, S. Enabling cyber resilient shipping through maritime security operation center adoption: A human factors perspective. Appl. Ergon. 2024, 119, 104312. [Google Scholar] [CrossRef] [PubMed]
- Bolbot, V.; Kulkarni, K.; Brunou, P.; Banda, O.V.; Musharraf, M. Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis. Int. J. Crit. Infrastruct. Prot. 2022, 39, 100571. [Google Scholar] [CrossRef]
- Dimakopoulou, A.; Rantos, K. Comprehensive Analysis of Maritime Cybersecurity Landscape Based on the NIST CSF v2.0. J. Mar. Sci. Eng. 2024, 12, 919. [Google Scholar] [CrossRef]
- Kechagias, E.P.; Chatzistelios, G.; Papadopoulos, G.A.; Apostolou, P. Digital transformation of the maritime industry: A cybersecurity systemic approach. Int. J. Crit. Infrastruct. Prot. 2022, 37, 100526. [Google Scholar] [CrossRef]
- Kaspersky ICS CERT. Statistics. Available online: https://ics-cert.kaspersky.com/statistics/ (accessed on 1 June 2024).
- CVE Security Vulnerability Database. Available online: https://www.cvedetails.com/ (accessed on 1 June 2024).
- Tenable Nessus 10.7.x User Guide. Available online: https://docs.tenable.com/nessus/10_7/Content/PDF/Nessus_10_7.pdf (accessed on 11 September 2024).
- Matherly, J. Complete Guide to Shodan; Shodan LLC: Seattle, WA, USA, 2016. [Google Scholar]
- Amro, A. Cyber-Physical Tracking of IoT devices: A maritime use case. NISK Nor. Informasjonssikkerhetskonferanse 2021, 3, 1–16. [Google Scholar]
- Tam, K.; Hopcraft, R.; Moara-Nkwe, K.; Misas, J.; Andrews, W.; Harish, A.; Giménez, P.; Crichton, T.; Jones, K. Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety. J. Transp. Technol. 2022, 12, 1–27. [Google Scholar] [CrossRef]
- Ni, T.; Zhang, X.; Zhao, Q. Recovering fingerprints from in-display fingerprint sensors via electromagnetic side channel. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark, 26–30 November 2023; pp. 253–267. [Google Scholar]
- Cao, H.; Liu, D.; Jiang, H.; Cai, C.; Zheng, T.; Lui, J.C.; Luo, J. HandKey: Knocking-triggered robust vibration signature for keyless unlocking. IEEE Trans. Mob. Comput. 2022, 23, 520–534. [Google Scholar] [CrossRef]
- Ni, T.; Zhang, X.; Zuo, C.; Li, J.; Yan, Z.; Wang, W.; Zhao, Q. Uncovering user interactions on smartphones via contactless wireless charging side channels. In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–25 May 2023; pp. 3399–3415. [Google Scholar]
- Zirnstein, Y. Better cybersecurity due to increased regulation? The final European Cyber Resilience Act—The first comprehensive, horizontally applicable approach for more cybersecurity in digital products. Comput. Law Rev. Int. 2024, 25, 65–72. [Google Scholar] [CrossRef]
- Official Journal of the European Union—European Sources Online. Available online: https://www.europeansources.info/eso_tax_series_titles/official-journal-of-the-european-union/ (accessed on 3 April 2025).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ćelić, J.; Vukšić, M.; Baždarić, R.; Cuculić, A. The Challenges of Cyber Resilience in the Maritime Sector: Addressing the Weak Awareness of the Dangers Caused by Cyber Threats. J. Mar. Sci. Eng. 2025, 13, 762. https://doi.org/10.3390/jmse13040762
Ćelić J, Vukšić M, Baždarić R, Cuculić A. The Challenges of Cyber Resilience in the Maritime Sector: Addressing the Weak Awareness of the Dangers Caused by Cyber Threats. Journal of Marine Science and Engineering. 2025; 13(4):762. https://doi.org/10.3390/jmse13040762
Chicago/Turabian StyleĆelić, Jasmin, Marko Vukšić, Robert Baždarić, and Aleksandar Cuculić. 2025. "The Challenges of Cyber Resilience in the Maritime Sector: Addressing the Weak Awareness of the Dangers Caused by Cyber Threats" Journal of Marine Science and Engineering 13, no. 4: 762. https://doi.org/10.3390/jmse13040762
APA StyleĆelić, J., Vukšić, M., Baždarić, R., & Cuculić, A. (2025). The Challenges of Cyber Resilience in the Maritime Sector: Addressing the Weak Awareness of the Dangers Caused by Cyber Threats. Journal of Marine Science and Engineering, 13(4), 762. https://doi.org/10.3390/jmse13040762