6,984 research outputs found

    Legal and Organizational-Technical Assurances of Aviation Security

    Get PDF
    The purpose of this article is to: 1) determine the essence of the conceptual categories related to the assurances of aviation security; 2) establish the state of regulation of aviation security; 3) formulate proposals and recommendations to improve this sphere of activity. Preparing the article a systematic approach was used as a general scientific method, and such methods of scientific knowledge as dialectical, logical-symmetric, system-functional, method of documentary analysis and analytical one were used. The legal and organizational-technical assurances of aviation security are characterized. The author definitions of "aviation security", "aviation vehicle safety", "organizational-technical assurances of security" and "legal security assurances". Modern methods and means of proper compliance with the main components of aviation security in Ukraine and in the world are analyzed. The directions to improve the organizational-technical assurances of aviation security are determined. The most dangerous, according to the author, aviation threats have been identified, perspective directions to overcome them have been suggested. According to the results of the research, the following basic principles of the organization of work on flight safety management, which are aimed at ensuring of aviation security, are identified: systematic; proaction; collectivism; awareness; identifying and eliminating causes; adequacy; responsibility

    Threats and challenges to maritime autonomous surface ships (MASS): role of law enforcement agencies

    Get PDF

    Trust and Suspicion as a Function of Cyber Security in Human Machine Team (HMT) of Unmanned Systems

    Get PDF
    The research focuses on cyber-attacks on cyber-physical systems of the unmanned vehicles that are characteristically used in the military, particularly the Air Force. Unmanned systems are exposed to various risks as the capacity of cyber attackers continue to expand, raising the need for speedy and immediate responses. The advances in military technologies form the basis of the research that explores the challenges faced in the timely detection and response to cyber-attacks. The purpose of the research is to study the connections between operator suspicion and the detection and response to cyber-attacks alongside the identification of theory of suspicion as the theoretical framework. The paper further presents the experiment used and the interview questions that offer the basis for the recommendations and importance of the research while answering the research questions. The conclusion from the literature review, interview, and experiment indicates the need for training among operators in the Air Force to reinforce their capacity in the detection and response to cyber-attacks and other adverse events that could compromise the execution of the mission established for unmanned systems. The research offers recommendations that can be implemented by the Royal Saudi Air Force (RSAF) in enhancing the security measures of unmanned systems

    Drones for parcel and passenger transportation: A literature review

    Get PDF
    Delivery drones and ‘air taxis’ are currently among the most intensely discussed emerging technologies, likely to expand mobility into the ‘third dimension’ of low-level airspace. This paper presents a systematic literature review of 111 interdisciplinary publications (2013 - 03/2019). The review systematizes the current socio-technical debate on civil drones for transportation purposes allowing for a (critical) interim assessment. To guide the review process four dimensions of analysis were defined. A total of 2581 relevant quotations were subdivided into anticipated barriers (426), potential problems (1037), proposed solutions (737) and expected benefits (381). We found that the debate is characterized by predominantly technical and regulatory problems and barriers which are considered to prevent or impede the use of drones for parcel and passengers transportation. At the same time, definite economic expectations are juxtaposed with quite complex and differentiated concerns regarding societal and environmental impacts. Scrutinizing the most prevalent transportation-related promises of traffic reduction, travel time saving and environmental relief we found that there is a strong need to provide scientific evidence for the promises linked to the use of drones for transportation. We conclude that the debate on drones for transportation needs further qualification, emphasizing societal benefits and public involvement more strongly.TU Berlin, Open-Access-Mittel - 201

    Airport Security Investment Model

    Get PDF
    In an increasingly mobile and diverse world, it is difficult to quantify the risk, or danger, associated with traveling. Airports have suffered greatly for being unable to define potential risks and protect against them. Intelligent adversary risk is a complicated high-level issue for many airports. Airports are targeted because of the large amount of people in a confined space and the social, economic, and psychological impact of terrorist attacks on the American people. In the months following September 11th, 2001, the airline industry in the United States lost $1.1 billion in revenue. The American people stayed grounded, for fear of another attack by plane. Recent airport attacks have had a similar effect. The nearly 350 airport attacks from 2000-2015 presents a massive opportunity for improvement. The presence of risk, in the form of terrorist attacks, is an influential deterrent for passengers. To combat the risk of attack, airports must provide a higher level of safety and security to people passing through their terminals. To decrease the risk of an attack, airports must increase the ability to defend itself. In the case of intelligent adversary attacks, a decrease in risk can be thought of as an increase in value. Multi-Objective Decision analysis (MODA), uses a Value-Focused Thinking model to quantify value. When dealing with human lives, models need to strive to add value not just increase cash flow. There are countless projects that could add value, so the selection will be complicated. A portfolio analysis will use a budget given by the decision maker and turn it into a set of the highest value projects for those dollars. The goal of this study is to canvas the type of solutions available, and give an optimal set of solutions to the decision maker

    European Reference Network for Critical Infrastructure Protection: ERNCIP Handbook 2017 edition Version 1.0

    Get PDF
    The ERNCIP network has been established to improve the protection of critical infrastructures in the EU. The European Reference Network for Critical Infrastructure Protection (ERNCIP) therefore works in close cooperation with all types of CIP stakeholders, focusing particularly on the technical protective security solutions. This handbook aims to assist the dissemination of the activities and results of ERNCIP. It is intended that the document will be updated and issued by the ERNCIP Office in spring each year. The information provided will be up to date as of the end of the previous calendar year, i.e. in this case as at 31 December 2016. The report summarises the achievements of all the ERNCIP Thematic Groups, providing a convenient way to access information on any specific theme of interest covered by ERNCIP. The report also describes current thematic group activities, to allow subject-matter experts and critical infrastructure operators to identify ongoing areas of research they might be interested in assisting. This report is publicly available via the ERNCIP web site, and is distributed to all ERNCIP Group of EU CIP Experts for onward dissemination within their Member State.JRC.E.2-Technology Innovation in Securit

    European Reference Network for Critical Infrastructure Protection: ERNCIP Handbook 2018 edition

    Get PDF
    The ERNCIP network has been established to improve the protection of critical infrastructures in the EU. The European Reference Network for Critical Infrastructure Protection (ERNCIP) therefore works in close cooperation with all types of CIP stakeholders, focusing particularly on the technical protective security solutions. This handbook aims to assist the dissemination of the activities and results of ERNCIP. It is intended that the document will be updated and issued by the ERNCIP Office in spring each year. The information provided will be up to date as of the end of the previous calendar year, i.e. in this case as at 31 December 2017. The report summarises the achievements of all the ERNCIP Thematic Groups, providing a convenient way to access information on any specific theme of interest covered by ERNCIP. The report also describes current thematic group activities, to allow subject-matter experts and critical infrastructure operators to identify ongoing areas of research they might be interested in assisting. This report is publicly available via the ERNCIP web site, and is distributed to all ERNCIP Group of EU CIP Experts for onward dissemination within their Member States.JRC.E.2-Technology Innovation in Securit

    Perspectives on Cyber Security for Offshore Oil and Gas Assets

    Get PDF
    In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operational technology) systems are evolving technologically, so are the cyber security threats faced by the offshore oil and gas assets. This paper aims to raise the awareness of cyber security threats and the organizational and technical measures that need to be adopted by the oil and gas industry for remote and complex assets in the upstream sector. A comprehensive literature review covering the areas of new IT/OT systems integration and cyber security risk analysis and management is presented. The results of a survey on the subject of cyber security for offshore oil and gas assets are also presented, and they provide valuable insight into the current industry culture and the perception of cyber security concepts. The importance of organizational culture, personnel training and involvement, as well as corporate engagement and support in the subject of cyber security is highlighte

    Perspectives on Cyber Security for Offshore Oil and Gas Assets

    Get PDF
    In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operational technology) systems are evolving technologically, so are the cyber security threats faced by the offshore oil and gas assets. This paper aims to raise the awareness of cyber security threats and the organizational and technical measures that need to be adopted by the oil and gas industry for remote and complex assets in the upstream sector. A comprehensive literature review covering the areas of new IT/OT systems integration and cyber security risk analysis and management is presented. The results of a survey on the subject of cyber security for offshore oil and gas assets are also presented, and they provide valuable insight into the current industry culture and the perception of cyber security concepts. The importance of organizational culture, personnel training and involvement, as well as corporate engagement and support in the subject of cyber security is highlighted

    Risk Assessment of Utilising an Extra-Large Autonomous Underwater Vehicle for Liquid CO2 Transportation

    Get PDF
    The development of autonomous maritime systems has been proliferating in recent years. One of these systems is a subsea shuttle tanker (SST) concept proposed as a potential alternative to pipelines and tanker ships for liquid CO2 transportation. The SST is an extra-large merchant autonomous underwater vehicle. It travels from onshore facilities, where CO2 is captured and transiently stored, to subsea wells for permanent storage and enhanced oil recovery projects. It is believed that introducing such extra-large AUVs can reduce the occurrence frequency of human-induced accidents. However, the potential accidents related to these vessels are still not detailed identified. Therefore, this work presents the full risk assessment of the SST for liquid CO2 transportation. This work aims to close the gap within the operative context and design characteristics of such autonomous underwater freight vehicles. To do so, a formal safety assessment is performed in accordance with International Maritime Organization standards. First, the most critical information about the SST regarding the risk assessment process is highlighted. Then, the preliminary hazard analysis is implemented to identify hazards and evaluate relevant risks based on the presented baseline SST. Subsequently, systematic hazard identification is used to find critical safety and security risks. Further, corresponding control safety options are addressed for risk mitigation. Finally, generic recommendations for the main design aspects of the SST are provided based on the work results. The presented assessment revealed 90 hazards and relevant scenarios, and the implemented analysis showed that the most prioritised risks are dedicated to human involvement at the stage of mission configuration. It is expected that the results of the performed assessment will be taken into account in further stages of the SST development and may be useful for future unmanned and autonomous marine transportation studies
    • …
    corecore