Even ports due to their importance in a country’s
economy and overall stability become a prime target
of cyber-attacks for wartime purposes.
Everything considered, there are plenty of actions
that can be taken to address the roadblocks of
cyberwarfare readiness. Improvements in education
in the maritime environment have already been
occurring, and as long as it is constantly reassessed
and improved upon, can lead to having
servicemembers more knowledgeable and ready for
cyberwarfare. Making sure that naval forces have
sufficient offensive and defensive cyber capabilities
is also crucial. Developing and maintaining robust
monitoring and response systems and capabilities is
essential to protect national security (Lieber, 2014).
Analyzing problems that are occurring, such as GNS
spoofing and jamming, and coming up with methods
to reduce or solve the issue, is also something that
must be practiced. Cooperation between states to
promote international rules of the road detailing
appropriate conduct and regulations will also prove to
be of benefit. All of this can be possible with the
commitment of many of the leaders of governments
and maritime organizations.
For future objectives, continued research by
academic researchers and practitioners so further
knowledge and action are achieved regarding
cyberwarfare readiness in the maritime environment
is suggested. Cyberspace is ungovernable in nature,
as it constantly evolves at a fast pace. It is both
inevitably threatening and inhabited by unknown
antagonists. The domain is both unique and
unpredictable. This however does not minimize the
need for cyber-security practices. They instead may
increase the need and desire to do so (Boyes, 2014).
Constant attention to the changes in cyberspace,
along with addressing arising challenges can help the
maritime environment be better prepared for the
possibility of cyberwar.
ACKNOWLEDGEMENTS
The completion of this research paper could not have
been possible without the guidance of Dr. Angela
Jackson-Summers, an Assistant Professor of
Information Systems at the United States Coast Guard
Academy.
REFERENCES
Albahar, M. (2019). Cyber Attacks and Terrorism: A
Twenty-First Century Conundrum. Science and
Engineering Ethics, 25(4), 993-1006.
Andronjna, A., Brcko, T., Pavic, I., & Greidanus, H. (2020).
Assessing Cyber Challenges of Maritime Navigation.
Journal of Marine Science and Engineering, 8(10), 776.
Bodeau, D. J., Graubart, R., & Fabius-Greene, J. (2010,
August). Improving Cyber Security and Mission
Assurance via Cyber Preparedness (Cyber Prep)
Levels. IEEE Second International Conference on
Social Computing, 1147-1152.
Boyes, H. (2014, January). Maritime Cyber Security –
Securing the Digital Seaways. Engineering &
Technology Reference, 1(1).
Chen, T. M. (2010). Stuxnet, The Real Start of Cyber
Warfare?[Editor's Note]. IEEE Network, 24(6), 2-3.
Cvetićanin, N. (2020, February 3). The Largest Battlefield
in History – 30 Cyber Warfare Statistics. Retrieved
January 20, 2022, from DataProt: https://dataprot.net/
statistics/cyber-warfare-statistics/
Cyber Threat Source Descriptions. (n.d.). Retrieved March
17, 2021, from CISA: https://www.cisa.gov/uscert/ics/
content/cyber-threat-source-descriptions
Daum, O. (2019). Cyber security in the Maritime Sector.
Journal of Maritime Law and Commerce, 50, 1-19.
de la Peña Zarzuelo, I. (2021). Cybersecurity in Ports and
Maritime Industry: Reasons for Raising Awareness on
this Issue. Transport Policy, 100, 1-4.
DiRenzo, J., Drumhiller, N. K., & Roberts, F. S. (2017).
Issues in Maritime Cyber Security. Westphalia Press.
Dombrowski, P., & Demchak, C. C. (2014). Cyber War,
Cybered Conflict, and the Maritime Domain. Naval
War College Review, 67(2), 70-96.
Dwarakish, G. S., & Salim, A. M. (2015). Review on the
Role of Ports in the Development of a Nation. Aquatic
Procedia, 4, 295-301.
Geers, K. (2008). Cyberspace and the Changing Nature of
Warfare. SC Magazine, 27.
Green, J. A. (Ed.). (2015). Cyber Warfare: A
Multidisciplinary Analysis. Routledge.
Hildreth, S. A. (2001, June). Cyberwarfare. Library of
Congress Washington DC Congressional Research
Service.
Hørthe, G. (2020, August 25). The Three Pillars of Cyber
Security. Retrieved January 16, 2022, from Nemko:
https://www.nemko.com/blog/the-three-pillars-of-
cyber-security
Johnson, T. A. (Ed.). (2015). Cybersecurity: Protecting
Critical Infrastructures from Cyber Attack and Cyber
Warfare. CRC Press.
Junio, T. J. (2013). How Probable is Cyber War? Bringing
IR Theory Back in to the Cyber Conflict Debate.
Journal of Strategic Studies, 36(1), 125-133.
Korstanje, M. E. (Ed.). (2016). Threat Mitigation and
Detection of Cyber Warfare and Terrorism Activities.
IGI Global.