• Media type: Electronic Conference Proceeding
  • Title: Building a virtual maritime logistics cybersecurity training platform
  • Contributor: Pyykkö, Harri [Author]; Kuusijärvi, Jarkko [Author]; Noponen, Sami [Author]; Toivonen, Sirra [Author]; Hinkka, Ville [Author]
  • Published: Berlin: epubli GmbH, 2020
  • Language: English
  • DOI: https://doi.org/10.15480/882.3130
  • ISBN: 978-3-7531-2346-2
  • Keywords: Supply Chain Management ; Industry 4.0 ; Innovation ; Logistics ; Data Science ; Digitalization ; Artificial Intelligence
  • Origination:
  • Footnote: Diese Datenquelle enthält auch Bestandsnachweise, die nicht zu einem Volltext führen.
  • Description: Purpose: This paper proposes how cyber ranges, which are simulation environments and platforms, can be used for cybersecurity training to reduce the vulnerability surface of the maritime supply chain caused by cyberthreat challenges. An additional benefit to conducting exercises for personnel with realistic environments is that unseen problems can be detected when training with different scenarios. Methodology: This study aims to create a holistic model for a cyber range training environment customized for the port/maritime logistics sector by simulating the actual operational environment. The research combines cybersecurity and risk management with the special requirements of maritime logistics. The methods used were a literature review and a workshop and interview setup with cybersecurity, risk management and maritime professionals. Findings: The demand for high-level resilience in global maritime supply chains, in addition to better business continuity management, is becoming increasingly important as global markets seek rapid responses to change. There are various new emerging technologies in the pipeline, which are rapidly gaining popularity in the logistics and supply chain management context. Cybersecurity preparedness is therefore essential. Originality: Organizational and individual cybersecurity preparedness can be improved when individuals have access to hands-on training with realistic cyber exer-cise scenarios that cover different levels of interactions and triggers/injects in the actual environment. The training scheme focuses on training both technical and non-technical staff to provide extensive coverage of cyber awareness.
  • Access State: Open Access
  • Rights information: Attribution - Share Alike (CC BY-SA) Attribution - Share Alike (CC BY-SA)