Insurance of Cyber Risks in International Transport

Vol.16,No.1(2022)

Abstract

The international transport of goods, passengers and luggage is recently facing the threat of cyberattacks. The article is focused on the analysis of the possible cyber risks in the field of the international transport and their management created by the international governmental and non-governmental organisations. The international regulation of the cybersecurity has only recommendatory character and will be subject to future development. That’s the reason why should carriers pay greater attention to all possible cyber security measures. As the instrument of the reduction and mitigation of cyber risks could be used cyber-insurance. The insurance companies are offering insurance cover mainly
on individual base corresponding to the extent of protection required by the policyholder.


Keywords:
Contractual Conditions; Cybersecurity; Insurance; Insurer; International Transport; Mitigation; Risk

Pages:
3–36
Author biography

Petr Dobiáš

CEVRO Institut, Chair of Private Law

Assistant professor
References

[1] Author not specified, password in Internet dictionary, Triple-E Class Container Ships, [online] Verdict Media Limited, Available from: https://www.ship-technology.com/projects/triple-e-class/ [Accessed 1 January 2021].

[2] Barki, D. and Deleze-Black, L. (ed.) (2020) Developments in International Seaborn Trade. UNCTAD Review of Maritime Transport 2020.

[3] BIMCO Guidelines on Cybersecurity Onboard Ships (version 4, 2020).

[4] CYRail Consortium Members. CYRail Recommendations on cybersecurity of rail signaling a communication systems. UIC-ETF, September 2018.

[5] ČTK. (2015) Hacker took control of the aircraft. He changed the direction of the flight. 18 May [online] Available from: www.tyden.cz/rubriky/zahranici/amerika/hacker-ovladl-dopravni-letadlo-zmenil-smer-letu_343213.html [Accessed 4 January 2021].

[6] Daily, J. et al. (2016) Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls. SAE International Journal of Commercial Vehicles, 9 (2).

[7] DiRenzo, J. et al. (2015) The Little-known Challenge of Maritime Cybersecurity. [online], p. 2, Available from: http://archive.dimacs.rutgers.edu/People/Staff/froberts/MaritimeCyberCorfuPaper.final.pdf [Accessed 4 January 2021].

[8] Dobiáš, P. (2019) Kybernetická bezpečnost v mezinárodní přepravě se stále podceňuje, Logistika 25 (1).

[9] Egan, R. et al. (2019) Cyber operational risk scenarios for insurance companies. British Actuarial Journal, 24, e6.

[10] Forbes, V., L. (2018) The Global Maritime Industry Remains Unprepared for Future Cybersecurity Challenges. [online] Available from: www.futuredirections.org.au/publication/the-global-maritime-industry-remains-unprepared-for-future-cybersecurity-challenges/ [Accessed 4 January 2021].

[11] Greenberg, A. (2016) Hackers Fool Tesla SʼS Autopilot to Hide and Spoof Obstacles. [online] New York: Wired. Available from: www.wired.com/2016/08/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles [Accessed 4 January 2021].

[12] IATA. Situational Analysis, Introduction to Cybersecurity Threats, Cybersecurity Mitigation Practices, Setting Up a Management System, Risk Assessment and Prioritization Instructions, 2nd edition, IATA, effective as of June 2015.

[13] ICAO Working paper, Assembly – 39 Session, Executive Comittee, Agenda Item 16: Aviation Security – Policy, Addressing Cybersecurity in Civil Aviation, A39-WP/17 EX/5, 30. 5. 2016.

[14] ICAO Working paper, Assembly – 40 Session, Executive Comittee, Agenda Item 12: Aviation Security – Policy, ICAO Cybersecurity strategy, A40-WP/28 EX/13, 25. 6. 2019.

[15] IMO Guidelines on Maritime Cyber Risk management (IMO’s Maritime Safety Committee, MSC-FAL.1/Circular 3, 5. 7. 2017).

[16] Jirásek, P., Novák, L., Požár, J. (2015) Explanatory Dictionary of Cybersecurity, Prague: PA CR in Prague, Czech branch of AFCEA.

[17] Jirovský, V. (2007) Cyber Crime. Prague: Grada.

[18] Karfíková, M. et al. (2018) Insurance Law. Prague: Leges.

[19] Kilcarr, S. (2015) Battling a hack: One fleet’s story. Fort Atkinson: Fleetowner. [online] Available from: https://www.fleetowner.com/technology/article/21692058/battling-a-hack-one-fleets-story [Accessed 4 January 2021].

[20] Kolouch, J., Bašta, P. et al. (2019) Cybersecurity. Prague: CZ.NIC.

[21] Lévy-Bencheton, C., Darra, E. (2015) Cybersecurity and Resilience of Intelligent Public Transport, Good practices and recommendations, Athens: ENISA.

[22] Mearian, L. (2015) Firewalls canʼt protect todayʼs connected cars, Computerworld [online] Available from: www.computerworld.com/article/2951878/telematics/firewalls-cant-protect-todays-connected-cars.html [Accessed 4 January 2021].

[23] Morán Blanco, M., S. (2017) La Ciberseguridad y el uso de las tecnologías de la información y la comunicación (TIC) por el terrorismo. Revista Espaňola de Derecho International, 69 (2).

[24] Muccin, E. (2015) Combatting Maritime Cybersecurity Threats. [online] Available from: http://magazines.marinelink.com/Magazines/MaritimeReporter [Accessed 4 January 2021].

[25] Saul, J. (2017): Global shipping feels fallout from Maersk cyber attack. [online] Thomson Reuters. Available from: https://www.reuters.com/article/us-cyber-attack-maersk/global-shipping-feels-fallout-from-maersk-cyber-attack-idUSKBN19K2LE/ [Accessed 1 January 2021].

[26] Smejkal, V. (2018) Cyber Crime. 2nd ed. Pilsen: Aleš Čeněk.

[27] Šulc, V. (2018) Cybersecurity. Pilsen: Aleš Čeněk.

[28] The Nautical Institute. Charging your phone on the bridge? Think again!, The Navigator, June 2016.

[29] Tonn, G., Kesan, J. P., Czajkowski, J. and Zhang, L. (2018) Cyber Risk and Insurance for Transportation Infrastructure. [online] Available from: https://riskcenter.wharton.upenn.edu/wp-content/uploads/2018/03/WP201802_Cyber-Security-Transportation-Sector.pdf [Accessed 4 January 2021]

[30] Walker, J. (2018) Autonomous Ships Timeline – Comparing Rolls-Royce, Kongsberg, Yara and More. [online] Available from: www.techemergence.com/autonomous-ships-timeline [Accessed 4 January 2021].

Metrics

0

Crossref logo

0


261

Views

302

PDF views