Skip to main content

Assessing the Risk of Ports and Their Supply Chains: The CYSM, MEDUSA, and MITIGATE Approaches

  • Living reference work entry
  • First Online:
Book cover Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense

Abstract

In the modern era, the ports’ Supply Chains (SCs) are the blood veins of global trade and subject to protection in political crisis and warfighting. Nowadays, these ports’ SCs (e.g., container management, vehicle transport, liquefied natural gas (LNG) storage and transport, cruising) are very complex, diverse and involve many cross border partners (e.g., governmental bodies, maritime companies, airports, railways, energy providers, banks, transport/logistic companies) operating within their SCs having physical and cyber multi-interdependencies, interacting with all sectors of economy. For example, most physical processes in ports (e.g., vehicles and cargo loading/unloading, LNG distribution and storage) are executed with autonomous or semiautonomous systems under the control of sophisticated logistic software systems (e.g., Industrial Cyber-Physical Systems, SCADA). These cyber-physical systems are connected around the world through cyberspace with other SC operators (e.g., ship industry, trading, transport, maritime, and logistics companies) to ensure a seamless and swift data exchange and with that swift and seamless trade from the producer down to the end consumer.

Associate Professor Nineta Polemi served as technical and project manager of the European projects CYSM, MEDUSA, and MITIGATE.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Austrian Standards Institute. (2004). ONR 49000: Risikomanagement für Organisationen und Systeme: Begriffe und Grundlagen, Wien.

    Google Scholar 

  • Bundesamt für Sicherheit in der Informationstechnik. (2013). IT-Grundschutz Kataloge. Online: https://www.bsi.bund.de/DE/Themen/ITGrundschutz/itgrundschutz_node.html

  • CCRA Working Group. (2006). Common criteria for information technology security evaluation, CCRA. [Online] Available: www.commoncriteriaportal.org

  • Common Criteria Working Group. (2007). Common methodology for information technology security evaluation – Evaluation methodology, CCMB-2007-09-004. http://www.commoncriteriaportal.org

  • European Commission. (2004). Regulation (EC) No 725/2004 of the European Parliament and of the Council of 31 March 2004 on enhancing ship and port facility security. Off J Eur Union, L 129/6, pp. 6–91.

    Google Scholar 

  • European Network and Information Security Agency. (2010). Inventory of risk management/risk assessment methods. [Online] Available: http://rm-inv.enisa.europa.eu/rm_ra_methods.html

  • International Maritime Organisation. (2004). International Ship and Port Facility Security Code, London.

    Google Scholar 

  • International Standardization Organization. (2005). ISO 20000: Information technology service management, Geneva.

    Google Scholar 

  • International Standardization Organization. (2007). Ships and marine technology – Maritime port facility security assessments and security plan development, Geneva.

    Google Scholar 

  • International Standardization Organization. (2009a). ISO 31000: Risk management – Principles and guidelines, Geneva.

    Google Scholar 

  • International Standardization Organization. (2009b). ISO 31010: Risk management – Risk assessment techniques, Geneva.

    Google Scholar 

  • International Standardization Organization. (2011). ISO 27005: Information security risk management, Geneva.

    Google Scholar 

  • International Standardization Organization. (2013). ISO 27001: Information security management system requirements, Geneva.

    Google Scholar 

  • Kalogeraki, E. M., Polemi, N., Papastergiou, S., & Panayiotopoulos, T. (2017). Modeling SCADA attacks. World conference on smart trends in systems, security and sustainability (WS4 2017), Springer Computer Science proceedings, 15–16 Feb 2017, London.

    Google Scholar 

  • Karantjias, A., Polemi, D., & Papastergiou, S. (2014). Advanced security management system for critical infrastructures. Special session on “secure and sustainable maritime digital environment” within the fifth international conference on information, intelligence, systems and applications (IISA 2014), 07 July 2014, Chania Crete.

    Google Scholar 

  • Papastergiou, S., & Polemi, D. (2014). Harmonizing commercial port security practices & procedures in Mediterranean Basin. Special session on “secure and sustainable maritime digital environment” within the fifth international conference on information, intelligence, systems and applications (IISA 2014), 07 July 2014, Chania Crete.

    Google Scholar 

  • Papastergiou, S., & Polemi, D. (2016). Securing maritime logistics and supply chain: The Medusa and MITIGATE approaches. 1st NMIOTC conference on cyber security in the maritime environment, NATO Maritime Interdiction Operational Training Centre, 4–5 Oct 2016, Chania Crete.

    Google Scholar 

  • Papastergiou, S., & Polemi, D. (2017). MITIGATE: A dynamic supply chain cyber risk assessment methodology. World conference on smart trends in systems, security and sustainability (WS4 2017), Springer Computer Science proceedings, 15–16 Feb 2017, London.

    Google Scholar 

  • Papastergiou, S., Polemi, N., & Karantjias, A. (2015a). CYSM: An innovative physical/cyber security management system for ports. Third international conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, 2–7 Aug 2015. Proceedings, pp. 219–230.

    Google Scholar 

  • Papastergiou, S., Polemi, D., & Papagiannopoulos, I. (2015b). Business and threat analysis of ports’ supply chain services. Special session on “innovative risk management methodologies and tools for critical information infrastructures (CII)” within the 6th international conference on digital human modeling and applications in health, safety, ergonomics and risk management (HCI International 2015), 2–7 Aug 2015, Los Angeles, CA.

    Google Scholar 

  • Peltier, T. R. (2001). Information security risk analysis. Boca Raton: Auerbach Publications.

    Google Scholar 

  • Polemi, N., & Kotzanikolaou, P. (2015). Medusa: A supply chain risk assessment methodology. In Cyber security and privacy: Vol. 530. Communications in computer and information science. Cham: Springer

    Google Scholar 

  • Polemi, D., & Papastergiou, S. (2015) Current efforts in ports and supply chains risk assessment. IEEE proceedings of the 10th international conference for internet technologies and secure transactions, London.

    Google Scholar 

  • Polemi, N., Kotzanikolaou, P., & Papastergiou, S. (2017). Design and validation of the MEDUSA supply chain risk assessment methodology and system. International Journal of Critical Infrastructures. Inderscience Publishers (Status: Under review).

    Google Scholar 

  • S. E. Schechter. (2004). Computer security strength and risk: A quantitative approach, Harvard University, Cambridge, MA.

    Google Scholar 

  • The Stationery Office (TSO). (2007). Continual service improvement, ITIL V3.

    Google Scholar 

Download references

Acknowledgments

This work has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653212, project MITIGATE . The authors also thank all partners of these projects. Finally, special thanks to University of Piraeus, Research Center for its continuous support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nineta Polemi .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this entry

Cite this entry

Polemi, N., Papastergiou, S. (2017). Assessing the Risk of Ports and Their Supply Chains: The CYSM, MEDUSA, and MITIGATE Approaches. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-06091-0_53-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06091-0_53-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06091-0

  • Online ISBN: 978-3-319-06091-0

  • eBook Packages: Springer Reference Economics and FinanceReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics