Cybersecurity and Disruptive Technologies

Jeptoo Kipkech, Kristen Kuhn, Siraj Shaikh

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    44 Downloads (Pure)


    Cybersecurity plays a vital role in the maritime industry due to increasing digitalisation and automation, which have resulted in the introduction of new threats and regulatory requirements. This digital transformation proves to be a double-edged sword as it is essential to the operation of critical shipping systems. However, it also poses a major risk to maritime infrastructure and vessels, leaving them vulnerable to cyber-attacks. The consequences of such cyber-attacks have a significant impact on the safety of personnel and the environment. This chapter focuses on cybersecurity and disruptive technologies through the lens of maritime vessels. It introduces vessels as a cyber-physical environment, examines the landscape of both cyber threats, vulnerabilities, and actual attacks in the maritime sector, identifies the efforts to overcome cyber threats to vessels and finally, analyses cyber power in the maritime environment. The findings suggest that, over recent years, industry stakeholders and regulatory bodies have made provisions towards cybersecurity in regulatory frameworks. These provisions focus on building effective cybersecurity resilience through awareness and training on the cyber threat landscape and cyber risk management of their information technology (IT) and operational technology (OT) systems.

    Original languageEnglish
    Title of host publicationRoutledge Handbook of Maritime Security
    Editors Ruxandra-Laura Boşilcă, Susana Ferreira , Barry J. Ryan
    Number of pages13
    ISBN (Electronic)9781003001324
    ISBN (Print)9780367430641
    Publication statusPublished - 25 Jul 2022

    Bibliographical note

    Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders.


    Dive into the research topics of 'Cybersecurity and Disruptive Technologies'. Together they form a unique fingerprint.

    Cite this