Verified Document

Maritime Safety And Security SOP For Homeland Security Perspectives In Cybersecurity Literature Review

Related Topics:

Introduction
The maritime industry is increasingly moving towards the adoption of systems that rely heavily on digitization, automation, and integration (Hayes, 2016). The extensive use of advanced technological solutions in the maritime industry is driven by the urgent need to maintain the industry in sync with all other industries that seem to have a step forward in adopting technological solutions. As a result of this growth and development in technological solutions, the security of data and other sensitive information has increasingly become a huge concern for the industry (Bueger, 2015). Cybersecurity has become a priority for the maritime industry. With many of the operational and critical system having already been digitized, automated, and integrated, the concern has now shifted to how entities within the maritime industry should implement appropriate procedures and policies to respond to cybersecurity incidents effectively.

Background

Cybersecurity refers to the ability of entities to prepare for possible attacks initiated through the internet, react to those attacks, and be able to recover from those cyber incidents (Kimberly, 2018). Cybersecurity in the maritime industry is not an isolated development, and recent incidents such as the Estonia cybersecurity attack in 2007 and Stuxnet in 2009 should have served to demonstrate to the Maritime industry the disruptiveness of cybersecurity breaches (Herzog, 2011). Having had no major cybersecurity issues in recent times, the maritime industry seems to have let its guard down. The maritime industry has played down any of the legitimate fears of a potential cybersecurity attack, despite 90% of the world trade being facilitated by the maritime industry (Hoffmann, 2018). Expectations, competition, and tensions are at highest as different entities within the maritime sector to streamline their services, add value, and strategically try to meet the demands of their customers and those of global safety and sustainability. Despite the technical dimension, cybersecurity has, there a growing consensus that cybersecurity can no longer continue being treated exclusively as a technological issue. There is an increasing need that guidelines established to maintain an effective maritime cybersecurity framework adopt a commitment to people and processes too other the current exclusive commitment on technology (Fitton, 2015). The underlying commitment of this project is to provide a critical guideline of preparing for, dealing with, and responding to cybersecurity issues based on three fundamental pillars; people, process, and technology.

Literature review

Traditionally, attacks in the maritime industry, especially on ships, were often in the form of...…clients in the industry (Hoffmann, 2018). Technology encourages the industry to be on its toes developing new and better technological solutions to provide improved cover to critical systems in the industry.

Investigatory Procedures to Be Used

To investigate cybersecurity threats to the maritime industry, the project will review various resources on the subject matter. The researcher will access these documents from websites, public libraries, books, and data from already filled in surveys. In the same vein, some government and nongovernment agencies store information which this project can retrieve and use. Many organizations are likely to implement the findings of this project to ensure that their networks, data, and systems are safe from cyber-attacks. The researcher will provide the results to all institutions and organizations to allow them to practice by the proposed recommendations.

Conclusion

Cybersecurity concerns have largely been centered around technical protection measures, which largely dictate concentrating on physical security. This approach has hugely neglected the people and processes which have equally huge importance to how the industry detects, deters, and recovers from cybersecurity issues. The current cybersecurity concerns demonstrate the need to have people-oriented, procedural, and technologically oriented guidelines to ensure comprehensiveness of the contingency, response, and recovery plans.…

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now