EconPapers    
Economics at your fingertips  
 

MITIGATE: a dynamic supply chain cyber risk assessment methodology

Stefan Schauer (), Nineta Polemi () and Haralambos Mouratidis ()
Additional contact information
Stefan Schauer: Austrian Institute of Technology
Nineta Polemi: European Commission
Haralambos Mouratidis: University of Brighton

Journal of Transportation Security, 2019, vol. 12, issue 1, No 1, 35 pages

Abstract: Abstract Modern port infrastructures have become highly dependent on the operation of complex, dynamic ICT-based maritime supply chains. This makes them open and vulnerable to the rapidly changing ICT threat landscape and many ports are not yet fully prepared for that. Furthermore, these supply chains represent a highly interrelated cyber ecosystem, in which a plethora of distributed ICT systems of various business partners interact with each other. Due to these interrelations, isolated threats and vulnerabilities within a system of a single business partner may propagate and have cascading effects on multiple other systems, thus resulting in a large-scale impact on the whole supply chain. In this context, this article proposes a novel evidence-driven risk assessment methodology, i.e., the MITIGATE methodology, to analyze the risk level of the whole maritime supply chain. This methodology builds upon publicly available information, well-defined mathematical approaches and best practices to automatically identify and assess vulnerabilities and potential threats of the involved cyber assets. As a major benefit, the methodology provides a constantly updated risk evaluation not only of all cyber assets within each business partner in the supply chain but also of the cyber interconnections among those business partners. Additionally, the whole process is based on qualitative risk scales, which makes the assessment as well as the results more intuitive. The main goal of the MITIGATE methodology is to support the port authorities as well as the risk officers of all involved business partners.

Keywords: Risk assessment; Cascading effects; Maritime supply chain services; Critical information infrastructures (CIIs) (search for similar items in EconPapers)
Date: 2019
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (6)

Downloads: (external link)
http://link.springer.com/10.1007/s12198-018-0195-z Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:jtrsec:v:12:y:2019:i:1:d:10.1007_s12198-018-0195-z

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/12198

DOI: 10.1007/s12198-018-0195-z

Access Statistics for this article

Journal of Transportation Security is currently edited by Andrew Thomas

More articles in Journal of Transportation Security from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:jtrsec:v:12:y:2019:i:1:d:10.1007_s12198-018-0195-z