Assessing Critical Entities: Risk Management for IoT Devices in Ports

Author:

Argyriou Ioannis1ORCID,Tsoutsos Theocharis1ORCID

Affiliation:

1. School of Chemical and Environmental Engineering, Renewable and Sustainable Energy Systems Laboratory, Technical University of Crete, 73100 Chania, Greece

Abstract

Integrating Internet of Things (IoT) devices into port operations has brought substantial improvements in efficiency, automation, and connectivity. However, this technological advancement has also introduced new operational risks, particularly in terms of cybersecurity vulnerabilities and potential disruptions. The primary objective of this scientific article is to comprehensively analyze and identify the primary security threats and vulnerabilities that IoT devices face when deployed in port environments. This includes examining potential risks, such as unauthorized access, cyberattacks, malware, etc., that could disrupt critical port operations and compromise sensitive information. This research aims to assess the critical entities associated with IoT devices in port environments and develop a comprehensive risk-management framework tailored to these settings. It also aims to explore and propose strategic measures and best practices to mitigate these risks. For this research, a risk-management framework grounded in the principles of ORM, which includes risk avoidance, reduction, sharing, and retention strategies, was developed. The primary outcome of this research is the development of a comprehensive risk-management framework specifically tailored for IoT devices in port environments, utilizing Operational Risk-Management (ORM) methodology. This framework will systematically identify and categorize critical vulnerabilities and potential threats for IoT devices. By addressing these objectives, the article seeks to provide actionable insights and guidelines that can be adopted by port authorities and stakeholders to safeguard their IoT infrastructure and maintain operational stability in the face of emerging threats.

Publisher

MDPI AG

Reference58 articles.

1. Critical Infrastructure Protection: Requirements and Challenges for the 21st Century;Alcaraz;Int. J. Crit. Infrastruct. Prot.,2015

2. From European Critical Infrastructure Protection to the Resilience of European Critical Entities: What Does It Mean?;Pursiainen;Sustain. Resilient Infrastruct.,2023

3. AI-Enabled Digital Identity—Inputs for Stakeholders and Policymakers;Mir;J. Sci. Technol. Policy Manag.,2022

4. Digital Transformation of the Maritime Industry: A Cybersecurity Systemic Approach;Kechagias;Int. J. Crit. Infrastruct. Prot.,2022

5. Assessing Cyber Threats for Storyless Systems;Meland;J. Inf. Secur. Appl.,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3