Content area
Full text
ABSTRACT:
The ECHO project aims at organizing and coordinating an approach to strengthen proactive cyber security in the European Union through effective and efficient multi-sector collaboration. One important tool for this aim is the ECHO Early Warning System (E-EWS). The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain, as well as models from other domains. In 2009, the Commission adopted a Communication Towards the integration of maritime surveillance in the EU: "A common information sharing environment for the EU maritime domain (CISE)," setting out guiding principles towards its establishment. The aim of the COM(2010)584 final was to generate a situational awareness of activities at sea and impact overall maritime safety and security. As a outcome of COM(2010)584 final, the EUCISE2020 project has developed a test-bed for maritime information sharing. This case study analyses information sharing models in the maritime domain, the EUCISE2020 test bed and the CISE itself as an alternative for cyber information sharing system. The maritime sector represents a suitable research case because it is already digitized in many aspects.
ARTICLE INFO:
RECEIVED: 08 MAY 2019
REVISED: 28 AUG 2019
ONLINE: 22 SEP 2019
KEYWORDS:
information sharing, maritime surveillance, early warning, cybersecurity, ECHO project
Creative Commons BY-NC 4.0
Introduction
Cybersecurity is critical to both our prosperity and our security, because our daily lives and economies become increasingly dependent on digital technologies.11 The main prerequisite towards cybersecurity is situational awareness (SA). Without cyber SA, it is impossible to systematically prevent, identify, and protect the system from the cyber incidents and if, for example, a cyber-attack happens, to recover from the attack. SA involves being aware of what is happening around your system to understand how information, events, and how your own actions affect the goals and objectives, both now and in the near future. It also enables to select effective and efficient countermeasures, and thus, to protect the system from varying threats and attacks. From research point of view, some aspects of the cyber SA area are more mature than others: there is plenty of work dedicated to cyber SA in industrial control systems, but less research has been devoted to areas such as information exchange and sharing for...





