Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework.

Sensors (Basel)

Department of Information Security and Communication Technology, Norwegian University of Science and Technology, 2815 Gjøvik, Norway.

Published: November 2022

Shipping performed by contemporary vessels is the backbone of global trade. Modern vessels are equipped with many computerized systems to enhance safety and operational efficiency. One such system developed is the integrated navigation system (INS), which combines information and functions for the bridge team onboard. An INS comprises many marine components involving cyber threats and vulnerabilities. This study aims to assess the cyber risks of such components. To this end, a methodology considering the MITRE ATT&CK framework, which provides adversarial tactics, techniques, and mitigation measures, was applied by modifying for cyber risks at sea. We assessed cyber risks of 25 components on the bridge by implementing the extended methodology in this study. As a result of the assessment, we found 1850 risks. We classified our results as 1805 low, 32 medium, 9 high, and 4 critical levels for 22 components. Three components did not include any cyber risks. Scientists, ship operators, and product developers could use the findings to protect navigation systems onboard from potential cyber threats and vulnerabilities.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9696195PMC
http://dx.doi.org/10.3390/s22228745DOI Listing

Publication Analysis

Top Keywords

cyber risks
20
mitre att&ck
8
att&ck framework
8
cyber threats
8
threats vulnerabilities
8
risks components
8
risks
6
cyber
6
components
5
assessing cyber
4

Similar Publications

Researchers have concentrated on identifying factors that might mitigate the negative consequences associated with cyber victimization. One key factor that has garnered significant attention is parental mediation in adolescents' digital technology usage and its role in reducing the risk of cyber victimization. Additionally, the buffering effects of parental mediation on the longitudinal associations among cyberbullying victimization, depression, and self-harm have been underexplored, especially cross-cultural investigations of such effects.

View Article and Find Full Text PDF

With the development of smart buildings, the risks of cyber-attacks against them have also increased. One of the popular and evolving protocols used for communication between devices in smart buildings, especially HVAC systems, is the BACnet protocol. Machine learning algorithms and neural networks require datasets of normal traffic and real attacks to develop intrusion detection (IDS) and prevention (IPS) systems that can detect anomalies and prevent attacks.

View Article and Find Full Text PDF

Dark Triad Personality Traits and Cyberbullying: The Mediating Role of Emotional Empathy.

Cyberpsychol Behav Soc Netw

December 2024

School of Psychological Sciences and Turner Institute for Brain and Mental Health, Monash University, Melbourne, Australia.

Nowadays, with the widespread use of the Internet, cyberbullying has become a pervasive threat to people. This study aimed to create a structural model of cyberbullying based on dark personality traits, with empathy as a mediating factor among students. A total of 360 students of the Mohaghegh Ardabili University were included using the multistage random sampling method.

View Article and Find Full Text PDF

Introduction: Analysis of crowd accidents contributes to accident prevention. Therefore, we employ a tensor-based approach. The innovative tensor-based approach facilitates the streamlining of longitudinal studies, promotes error detection, and enhances the transparency and traceability of data collection.

View Article and Find Full Text PDF

Dissecting the Predictors of Cyber-Aggression Through an Explainable Machine Learning Model.

Aggress Behav

January 2025

Key Research Base of Humanities and Social Sciences of the Ministry of Education, Academy of Psychology and Behavior, Tianjin Normal University, Tianjin, China.

The general aggression model (GAM) suggests that cyber-aggression stems from individual characteristics and situational contexts. Previous studies have focused on limited factors using linear models, leading to oversimplified predictions. This study used the light gradient boosting machine (LightGBM) to identify and rank the importance of various risk and protective factors in cyber-aggression.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!