ArticlePDF Available

Cybersecurity in Maritime Transport: An International Perspective on Regulatory Frameworks and Countermeasures

Authors:
  • Odesa National Maritime University
  • Research Institute for Legal Support of Innovative Development of the National Academy of Legal Sciences of Ukraine

Abstract and Figures

This article combines legal, technical, and organizational aspects to propose a comprehensiveapproach to addressing cybersecurity of maritime transport. It highlights key gaps inthe international legal framework and suggests a unified legal framework to regulate these cyberthreats from a maritime transportation perspective. The article focuses on technical solutionsbut is supported by professional training in a virtual environment. The main innovation of thisarticle is the interdisciplinary approach, combining technological advances with social researchand legal analysis. Among other proposals, developing an international maritime cybersecurityconvention, a standard global incident registry and a transnational data sharing system areproposed. Such a systematic framework would have serious potential to address critical safetyissues and improve the safety of the global shipping industry.
LEX PORTUS VOL 11 ISS 1 2025
ISSN 2524-101X
eISSN 2617-541X
DOI 10.62821/lp11101
Cybersecurity in Maritime Transport:
An International Perspective on Regulatory
Frameworks and Countermeasures
Oleksiy Melnyk*, Oleksandr Drozdov**, Serhii Kuznichenko***
*Professor, Master Mariner, Navigation and Maritime Safety Department, Odesa National Maritime University (34, Mechnikova St., Odesa, Ukraine)
https://orcid.org/0000-0001-9228-8459
**Professor, Yaroslav Mudryi National Law University (77, Hryhoriia Skovorody St., Kharkiv, Ukraine), University of Barcelona (08034,
684 Av. Diagonal, Barcelona, Spain) https://orcid.org/0000-0003-1364-1272
***Professor, National Academy of Legal Sciences of Ukraine (80, Chernyshevskaya St., Kharkiv, Ukraine) https://orcid.org/0000-0001-9278-2756
ABSTRACT
This article combines legal, technical, and organizational aspects to propose a comprehensive
approach to addressing cybersecurity of maritime transport. The article highlights key gaps in
the international legal framework and suggests a unied legal framework to regulate these cyber
threats from a maritime transportation perspective. The article focuses on technical solutions
but is supported by professional training in a virtual environment. The main innovation of this
article is the interdisciplinary approach, combining technological advances with social research
and legal analysis. Among other proposals, developing an international maritime cybersecurity
convention, a standard global incident registry and a transnational data sharing system are
proposed. Such a systematic framework would have serious potential to address critical safety
issues and improve the safety of the global shipping industry.
CITATION
Melnyk, O., Drozdov, O., &
Kuznichenko, S. (2025). Cyber-
security in Maritime Transport:
An International Perspective
on Regulatory Frameworks
and Countermeasures.
Lex Portus, 11(1), 7–19.
https://doi.org/10.62821/lp11101
KEYWORDS
maritime cybersecurity, maritime
law, incident response, global
maritime security standards,
international legal frameworks
The journal is licensed under a Creative Commons Attribution-
NonCommercial-ShareAlike 4.0 International License
Introduction
Cyberthreats represents a vital concern for anything to do with global logistics and
transportation security regarding the maritime industry. As shipping becomes largely
dependent on digital technologies like automated vessel trac management, IT systems, and
electronic data exchange, it becomes more and more vulnerable to cyberattacks. Enacting
legislation against these acts may represent a big step in the creation of an international
maritime security conguration. However, several factors pose challenges to establishing law:
the international character of maritime transport, the complicated identication, and the lack
of uniform security standards.
Studies in recent times reveal that the maritime industry is becoming a victim of cyber-
attack every year. Currently, vessel control systems, navigation systems, and logistics platforms
are most frequently targeted by cyber perpetrators threatening the global maritime safety.
The gravity of cybersecurity issues in the maritime sector is well attested by academic
studies like that of Emre et al. (2024), which details major cyber incidents within this realm,
highlighting the inadequacy of ship control systems to guard against advanced attacks.
A famous instance is the NotPetya virus, which altered the activities of Maersk and thus
represents a far-reaching impact of cyberattacks on global supply chains.
8LEX PORTUS VOL 11 ISS 1 2025
According to Clavijo et al. (2024), maritime supply chains are especially vulnerable due
to their multi-layer structure made of suppliers, transportation rms, and ports. Kanwal
etal. (2022) pinpointed that current ship navigation systems (AIS, GPS) are poorly defended
against cyber threats and, therefore, pose a signicant threat to the security of the maritime
domain. Further, Park et al. (2023) initiated an organized conclusion Failure Mode and
Eects Analysis (FMEA) for risk evaluation; underlined the organization requirement under
vulnerability evaluations within navigation systems. Progoulakis et al. (2022) presented
cybersecurity issues in relation to port and oshore asset security threats, including essential
security measures and collaborative defenses.
The analysis of port infrastructure was made dicult by the complexity within their
cybersecurity by Syta (2024), who accentuated that many ports do not perform system
modernization satisfactorily due to technological and nancial constraints. Ports in developing
countries remain extremely vulnerable, as emphasized and evidenced by Patrick et al. (2024),
who discussed global port infrastructure protection practices with the C2M2 model as a case
study. According to Sime (2023), many African ports remain vulnerable to threats because of
the non-implementation of international standards into national legislation. Consequently,
logistics losses would be signicant and threaten disruption in global transportation.
Research conrms that cybersecurity threats in the maritime industry are growing, covering
a wide range of issues. A review of the rst decade of maritime cybersecurity research outlines
key challenges and gaps in the eld (Harish et al., 2025). The analysis of CO₂ emissions in
maritime transport using AIS data demonstrates the importance of digital technologies
for environmental monitoring, which is also a potential target for cyberattacks (Cheng et al.,
2024). A bibliometric study of cybersecurity in the maritime sector over the past 20 years helps
to identify the main research areas and prospects (Mawer et al., 2024). In matters of overall
maritime security, it is important to consider both traditional and digital threats (Melnyk et al.,
2022). The use of simulation modeling allows forecasting changes in maritime security under
the inuence of cyber threats and complex scenarios (Melnyk et al., 2023). In particular, the
oshore oil and gas industry remains particularly vulnerable to attacks on remotely operated
platforms and supply vessels, which poses additional challenges to the security of maritime
operations (Progoulakis et al., 2021).
Countering cybercrime in maritime transportation calls for proper training of personnel. As
such, Chupkemi & Mersinas (2024) submitted the need for compulsory cybersecurity training
for shipping companies’ employees. However, given the fast-changing threats, traditional
training methods have become increasingly inadequate. According to Jepsen et al. (2024),
a novel approach has been developed based on game-based learning, which better equips
seafarers to become aware of the kinds of cyber-attacks they possibly face. Nikolov (2024)
conceptualized a virtual training environment simulating real cyber threats while signicantly
improving operators’ training aboard ships. Technology innovation is crucial in safeguarding
maritime infrastructures. According to Ibokette et al. (2024), AI systems automatically detect
network attacks, thus minimizing human error with regard to identifying such attacks.
A proposal to integrate sensor data into a single system to protect port infrastructure,
allowing real-time monitoring of threats, Potamos et al. (2024) presented a proposal to
integrate sensor data into a single system to protect port infrastructure, allowing real-time
threat monitoring. Yousaf and Zhou (2024) also explored the possibility of using MITRE ATT&CK
and D3FEND to protect ships, which they argue involves predicting upcoming attacks and
responding automatically.
As noted by Martínez et al. (2024), such situation creates a disaggregated system of regulatory
laws for cybersecurity in the maritime industry. This paper emphasizes the urgent need for
9LEX PORTUS VOL 11 ISS 1 2025
a binding international agreement governing the cybersecurity of any maritime infrastructure.
Dimakopoulou and Rantos (2024) showed that linking maritime operations to international
standards such as NIST CSF v2.0 proves that their adaptation can enhance ship security.
The cybersecurity is a key component of the modern maritime industry, as the digitalization
of ports and vessels creates new threats (Neumann, 2024). A bibliometric analysis of current
studies conrms that interest in this problem is emerging at a rapid pace (Peng et al., 2025;
Mawer et al., 2024), and the main challenges remain unresolved.
A systematic review shows that cybersecurity threats include hacking of ship systems,
attacks on automated ports, and risks to navigation (Bolbot et al., 2022). Text mining
techniques are identifying new threats, especially in the transportation of dangerous
goods(Huang et al., 2025). The risk life cycle of cargo ships is analyzed based on probabilistic
models (Jiang et al., 2025). The development of risk assessment and mitigation methods
is a priority for international organizations. For example, the CRAMMTS method allows
assessing the cyber risks of maritime companies based on surveys (Tatar et al., 2024).
Dynamic modeling of ship cyber resilience demonstrates the importance of a systematic
approach (Putra et al., 2024). The level of employee awareness is a key factor in preventing
cyber threats. An analysis of the level of knowledge of maritime students (Karaca & Soner,
2023) and industry workers (Aşan, 2024) revealed signicant gaps. In Malaysia, the level of
cybersecurity implementation depends on economic and regulatory factors (Ahmad et al.,
2024). Big language models can be used to improve risk analysis and security of maritime
operations(Miller et al., 2025). Automated approaches to risk and attack analysis can improve
situational awareness (Xia et al., 2024). Research in Indonesia shows the eectiveness of
a multi-level cyber defense strategy(Putri & Burhanuddin, 2023).
Autonomous vessels are particularly vulnerable to attacks on authentication
systems(Crawford & Sylvanus, 2023). Legal aspects of gray areas in international maritime law
aect cybersecurity law enforcement (Kormych et al., 2023). Military conicts are changing the
approach to maritime security, as the example of the Black Sea shows (Kormych et al., 2024).
Risks in nancial technologies and their connection with the maritime sector are studied in the
context of digital transactions (Popova et al., 2024). An analysis of energy systems in maritime
transport emphasizes the vulnerability to cyberattacks (Prasetyo et al., 2022).
The protection of ships in military convoys requires optimization of speed and schedule,
which also aects overall security (Qiao et al., 2024). The use of eye-tracking technology allows
to assess the level of attention of operators in critical situations (Petrović & Vujičić, 2025).
An analysis of the various works under review clearly reveals some gaps that require further
investigation. Lack of a unied international legal framework, poor port security in developing
countries, limited use of innovative technologies and low level of personnel training are the
major gaps in combating cybercrime in maritime transportation. This article proposes to
review applicable international and national legal frameworks, analyze the main technological
measures to counter cyber threats and explore opportunities for international cooperation in
this eld.
1. Overview of cyber threats in shipping industry
The United Nations (UN), as well as the International Maritime Organization (IMO), have
supported recommendations on maritime cyber security, as reected in the adoption of
resolution MSC.428(98). This resolution requires shipowners to include cyber risks in ship security
management plans. However, at this point arose a jurisdiction problem since attacks can come
from anywhere worldwide. Increased cooperation between states, intelligence sharing, and the
creation of specialized cyber police units may be some ways to address the problem.
10 LEX PORTUS VOL 11 ISS 1 2025
Cybersecurity in maritime transportation is a broad spectrum of threats targeting virtually
all aspects of shipping and port infrastructure. For example, hacking into navigation systems,
AIS or GPS, allows attackers to alter ship routes, create false coordinate positions, and cause
collisions or cargo theft. Interference with vessel control systems, which takes control of
onboard systems, leads to accidents, ship stoppages, or even hijackings. Stealing course data
and cargo information - stealing important information about cargo in transit facilitates pirate
attacks and economic blackmail. Sabotage against port systems is designed to paralyze port
operations, from delayed unloading to mismanagement of containers, resulting in nancial
losses (Table 1).
Table 1. Classication of cyberattacks’ targets in maritime transportation
Type of Target Description Possible Consequences
Navigation System Breach
(AIS, GPS)
Interference with
vessel navigation and
communication systems
Route deviation, collision
provocation
Ship Management System
Interference
Hijacking vessel control,
sabotaging onboard systems
Vessel hijacking, accidents,
shipwrecks
Theft of Cargo and
Route Data
Stealing commercial data on
cargo and shipping routes
Financial losses, piracy
Sabotage of Port Operations Breaching port management
systems, delaying cargo
handling
Logistics delays, nancial
losses
The history of shipping already knows many signicant cyber incidents. One of the
most famous cases was the NotPetya virus that paralyzed Maersk’s global operations in
2017, causing an estimated $300 million in damages. The virus damaged corporate cargo
management systems and caused disruptions at dozens of ports. Attacks on container
terminals also pose a serious threat: in 2021, attackers disabled control systems at several
major ports, causing huge delays. Lastly, cases of illegal intrusion into port systems include
hackers who divert cargo, create false declarations or steal sensitive data, destabilizing global
supply chains.
Various types of cyber threats aect maritime transport, including phishing attacks,
malware infections, data breaches, ransomware, and DDoS attacks. The distribution of these
threats is illustrated in Figure 1, based on cybersecurity reports analyzing maritime sector
vulnerabilities.
Cyber threats can pose a real risk to shipping security, so their comprehensive classication
is very important for countermeasures. Network attacks, such as distributed denial of service
(DDoS) and man-in-the-middle (MITM), target communication systems, disrupt data ows, and
jeopardize condential exchanges. Malware such as viruses, Trojans, and spyware can damage
critical systems and steal sensitive data.
Attacks on the security of navigation systems involve GPS spoong and signal jamming.
These actions manipulate ship location data, which disrupts navigation and jeopardizes
operations. Cargo manipulation involves tampering with cargo or accompanying documents
or altering shipment data, which can facilitate smuggling and illicit trade. Finally, social
engineering is gaining access to critical maritime databases (Table 2) by exploiting weaknesses
in the human factor through phishing or false login attempts.
11LEX PORTUS VOL 11 ISS 1 2025
Figure 1. Distribution of cyber-attacks on maritime transport
(Source: Research analysis based on cybersecurity reports)
Table 2. Classication of cyber threats in the maritime industry
Category of Threats Examples Description
Network Attacks DDoS, MITM, Phishing Disruption of communication
and data transfer
Malware Attacks Viruses, Trojans, Spyware System damage and data theft
Navigation System Attacks GPS Spoong, Signal
Jamming
Ship disorientation and
navigation failures
Cargo Manipulation Cargo Data Forgery Illegal operations and
smuggling
Social Engineering Phishing, Account
Compromise
Hacking of personnel accounts
through deception
Thus, the diagram in Figure 2 illustrates the complex mechanism of a cyber-attack on
maritime transportation. It is structured to reect both linear and branched attack paths,
making it versatile for analyzing cyber threats in the maritime sector.
Figure 2. Compact Maritime Cyberattack Mechanism Diagram
12 LEX PORTUS VOL 11 ISS 1 2025
The main nodes of the presented scheme include attack phases such as cyberattack
initiation, hacking navigation systems, data collection, malware injection, and sabotage of
port infrastructure. The cyberattack begins with vulnerable entry points, including phishing
campaigns, malware injection, and supply chain compromise. Once inltrated, attackers get
to the system’s vulnerabilities by navigating the network with elevated privileges.
Further steps include hacking into shipboard AIS/GPS systems, intercepting data,
installing ransomware, and compromising IoT devices in port. All of this can lead to logistical
disruptions, nancial losses and resulting loss of reputation, as well as covert activities of
attackers by masking their tracks and bypassing security systems.
2. Legal aspects of countering cyberthreats at sea
One of the key international instruments in the eld of the law of the sea is the 1982
United Nations Convention on the Law of the Sea (UNCLOS), which establishes the
foundations of the legal regime of the world’s oceans. Although there are no explicit rules
governing cybercrime in the text of the Convention, UNCLOS provides a framework for
states to cooperate in ensuring the safety of maritime navigation and preventing unlawful
acts. States are obliged to prevent the use of their ships for illegal activities, which can
beinterpreted as the need to counter cyber-attacks on ships ying their ag. It should be
kept in mind that the legal framework of UNCLOS is limited to maritime cybersecurity
applications, as the document initially focused on traditional threats such as piracy and illicit
trade. However, the growing dependence of the maritime industry on digital technologies
requires updating international treaties.
The Council of Europe Convention on Cybercrime (2001), known as the Budapest
Convention, is the primary international agreement for combating cybercrime. While it
initially focused on crimes committed on land, its principles can be adapted to the maritime
domain. The Convention facilitates international cooperation, including extradition,
joint investigations, and information exchange, which is vital given the global nature of
cybercrime at sea.
According to IMO Resolution MSC.428(98), initiated by the International Maritime
Organization (IMO), this regulation is the rst to tackle maritime cybersecurity directly.
It requires shipping companies to incorporate cyber risk management tools into their
security management systems (ISM Code). This obligation aims to reduce the eects of
cyber-attacks on vessels and diminish the risks to global maritime shipping.
National legal acts. These measures enacted by the leading maritime states are
essentially the essential elements that make up the response to cybercrime in the maritime
realm. The U.S. has passed an array of legal measures, such as the Maritime Transportation
Security Act (MTSA) for the security of maritime transportation infrastructure and the
Computer Fraud and Abuse Act (CFAA) addressing computer crime. These acts create
a basis for protecting critical maritime infrastructure and legally punishing those who are
perpetrating cyber-attacks.
In the European Union, the NIS (Network and Information Systems) Regulation was
adopted and introduced mandatory cybersecurity standards for the operators of critical
infrastructures, such as seaports and shipping companies. ENISA (European Cybersecurity
Agency) is creating specic recommendations for the shipping industry to raise the level of
protection of maritime systems. These measures, therefore, strengthen European legislation
as adapted to address threats beyond maritime cyberattacks.
Jurisdiction and enforcement. Maritime cybercrime creates tremendous legal problems
concerning jurisdiction and enforcement. The transnational nature of cyber-attacks
13LEX PORTUS VOL 11 ISS 1 2025
complicates the establishment of jurisdiction since some attacks may originate from servers
in one state, aect vessels ying the ag of another, and impact the infrastructure of third
countries. Jurisdiction for cyber-attacks against ships is determined by the ag under which
they sail in accordance with UNCLOS, but such an approach is inadequate in the context of
cyber threats.
Another diculty regarding liability determination arises from issues in establishing
the source of attacks. Legal scholars generally refer to the situation as “hybrid jurisdiction,”
according to which states conduct joint investigations into such incidents.
The collection and presentation of evidence are made even more dicult since the
digital traces of cybercrime can be easily and quickly destroyed. Furthermore, international
evidential procedures are stressed by each state’s very dierent laws. In other words, the use
of joint investigation teams and Mutual Legal Assistance Treaties (MLATs) becomes crucial in
the whole process.
One of the prime issues in maritime cybersecurity concerns the ability to balance
anonymity and identication in cyber-attacks. With the growing reliance on technologies
such as IP masking and encrypted networks, identifying the perpetrator can be a case too
thick to cut. Thus, new international frameworks on legal recognition of cyber-intelligence
methods would go a long way in promoting data sharing among countries and between
public and private sectors as possible solutions to the problem.
Legislation on maritime cybercrime should thus be related to international standards,
national requirements, and stringent enforcement. International cooperation and the
harmonization of legal standards across various countries would thus make a single
international framework for the cybersecurity of maritime shipping possible.
3. Technological measures to counter maritime cyberthreats
Implementation of cyber security systems on ships and in ports. The development
and implementation of technological solutions is a key element in countering maritime
cyberthreats. These measures include security systems, cyber threat monitoring and
standardization of management technologies. Eective cybersecurity systems protect ships
and ports from cyberattacks. Modern systems include network infrastructure protection,
data encryption, access control, and crew training. For example, the International Maritime
Organization (IMO) recommends integrating cybersecurity into ship management systems
to minimize the risks of attacks on navigation systems, automation and cargo platforms.
Eective maritime defense requires comprehensive technical solutions, such as the use of
automatic intrusion detection systems (IDS), cryptographic data transmission protocols, and
rewalls with adaptive algorithms.
As shown in Figure 3, a hierarchical representation of the port cybersecurity system is
used, using a branching structure to demonstrate the important components and their
interrelationships. This emphasizes a layered approach to security measures, ranging from
broad categories to detailed operational elements.
Articial intelligence (AI) and machine learning systems can analyze large data sets in real-
time and identify anomalies and suspicious activities. The application of AI makes it possible
to predict potential threats, respond to incidents, and optimize ship management processes.
An important direction in ensuring maritime transportation safety is the creation
of secure digital logistics platforms, such as global distribution systems (GDS) and
passenger data management (PNR) platforms. These systems ensure the secure exchange
of information between participants in the logistics chain, preventing data leaks and
unauthorized access.
14 LEX PORTUS VOL 11 ISS 1 2025
Figure 3. Hierarchical representation of the Port Cybersecurity System
Infrastructure projects. The introduction of autonomous ships has been an important step
in the digitalization of the maritime industry. Remotely, captains operate autonomous ships
using secure communication channels. These systems minimize the impact of human error and
improve navigational safety. Examples of such projects include Rolls-Royce developments and
the SEA-KIT autonomous ship project.
The diagram shown in Figure 4 depicts the interaction of key components of an
autonomous control center used to coordinate the various elements in complex systems such
as autonomous vessels.
Figure 4. Advanced autonomous ship protection system architecture
The Autonomous Control Center is the core center, a control node that carries the relay of
communication amongst the coalescing sensors, the navigation systems, safety modules,
etc., other functional components. The interconnections between the elements illustrate very
important data ows, for example, navigational information dissemination, threat detection,
GPS synchronization, and redundancy of data. It takes care of the integrity and security of the
system with the exibility to go along with an intricate, real-time condition.
15LEX PORTUS VOL 11 ISS 1 2025
Indeed, ship management technology is set to be standardized, with all systems
incorporating these standardized communications, navigation, and monitoring
technologies. The International Maritime Organization strongly supports these standards,
facilitating the integration of innovative technologies throughout the shipping industry. One
notable initiative is the International SMART Ship project, which has emerged as a successful
example of developing smart ships that enhance navigation capabilities and improve
resilience against cyber threats.
Therefore, technological measures to eliminate cybercrime at seas involve protecting
networks and data and establishing innovative solutions to secure the maritime
infrastructure. The integration of standards, the use of AI, and the future advancement of
autonomous vessels create a multi-tiered protective layer as our environment becomes more
digital.
4. Organizational measures and international cooperation
to counter syberthreats at sea
Combating cybercrime at sea requires coordinated action at the international level.
Organizational measures include establishing international bodies, strengthening interstate
cooperation, and developing training and certication for maritime professionals.
The International Maritime Organization (IMO) actively promotes maritime cyber security
by establishing a special task force to develop policies, standards and recommendations.
IMO Resolution MSC.428(98) requires shipowners to incorporate cyber risk management into
ship security management systems, making this measure mandatory from 2021 onwards.
A number of international organizations and regional blocs, such as the European Union
(EU) and the Shanghai Cooperation Organization (SCO), have entered into agreements
aimed at coordinating eorts to secure digital infrastructure at sea. Examples include the
EU’s Network and Information Security (NIS) Directive and INTERPOL’s global cooperation
program to combat cybercrime.
To eectively address cyber threats, a dependable system whereby countries can
exchange information regarding attacks, vulnerabilities, and best practices must be
established. Organizations like Europol’s EC3 and Interpol’s International Cyber Defense
Center help to facilitate rapid responses using worldwide early warning systems and joint
research programs. An example of a successful international collaboration is the European
Maritime Security Network (EMSA), uniting European states in countering and investigating
cyberattacks.
The formation of joint incident investigation teams at the international level accelerates
the detection of cyber-attacks on ships and maritime infrastructure. Examples of successful
initiatives include INTERPOL’s Operation OPERATION 404, which addresses cyber threats in
international waters.
The cyber security competency of maritime industry professionals plays a key role in
protecting ships. International training programs include courses on cyber risk management,
cyber attack simulation and certication of maritime operators. Standards for cybersecurity
training should be harmonized. International associations of maritime universities are
developing training programs that are consistent with IMO and International Association of
Maritime Institutes (IAMU) recommendations. Examples include international cybersecurity
training at the IAMU in Sweden.
Thus, institutional measures, including the establishment of specialized bodies, interstate
cooperation and the development of certication systems, play a crucial role in shaping
a global strategy for preventing cybercrime at sea.
16 LEX PORTUS VOL 11 ISS 1 2025
5. Discussion
Eectively countering cybercrime in the maritime industry requires a systematic approach
that includes the development of international legislation, strengthening enforcement
mechanisms and using advanced technologies. Let us consider the key areas of perspectives
and recommendations.
Given the global nature of cybercrime, developing a specialized international convention
regulating maritime cybersecurity is an urgent task. Such a convention could combine the
norms of the International Convention for the Safety of Life at Sea (SOLAS), the United Nations
Convention on the Law of the Sea (UNCLOS), and the Council of Europe Framework Convention
on Cybercrime, ensuring more comprehensive regulation. Establishing an international
maritime cyber threat data sharing system, including a global incident registry and a rapid
response center, will enable rapid coordination of eorts.
Global sanctions mechanisms similar to those used for terrorism and piracy could be an
eective deterrent. Such measures include asset freezes, a ban on maritime trade, and a ban on
ships suspected of cyber-attacks entering ports of IMO member states.
A centralized database of cyber-attacks on ships and maritime facilities would improve
threat monitoring by providing early warning of possible attacks. International organizations,
such as IMO or INTERPOL, in cooperation with national authorities, could maintain this registry.
International rapid response teams for cyber-attacks could operate similarly to maritime
rescue services. Such teams would conduct operational investigations, provide digital
forensics, and protect key maritime assets from threats in real-time.
Blockchain technology can protect critical data such as navigation routes, ship logs and
contracts. Blockchain-based systems can prevent information manipulation and ensure
transparency and reliability of data in logistics chains.
Integrating autonomous cyber defense systems on ships will enable automatic detection
and blocking of cyber-attacks. Articial intelligence and machine learning will ensure
constant monitoring of the ship’s digital environment and the application of protective
measures without human intervention. As mentioned, Rolls-Royce and Kongsberg are already
developing examples of such systems.
Conclusions
The analysis of legal, technological and organizational aspects revealed such key challenges
as the lack of a unied international regulatory framework, problems related to jurisdiction and
attribution of cyberattacks, and the rapidly changing pace of development of technologies
used by attackers. Key recommendations include developing a new international convention
on maritime cybersecurity, implementing international mechanisms, creating global threat
databases, and forming interstate task forces. Technological measures should be based on
introducing autonomous defense systems, using blockchain for data protection and articial
intelligence for threat monitoring.
Legislation, technology, and training should be considered as part of a layered approach
to nding solutions. Improved international cooperation, including information sharing and
joint incident response, remains key to the security of the maritime industry. This argument
points to an essential fact that the international community must realize global maritime
cybersecurity standards must be developed to provide a robust, resilient framework to counter
modern cyber threats. All proposed measures involve cooperation between states, maritime
companies, and international organizations. In this way, global maritime cybersecurity
standards will provide higher protection for shipping routes and ports, minimizing economic
and social risks.
17LEX PORTUS VOL 11 ISS 1 2025
REFERENCES
Ahmad, N., Zainordin, N., Izni, N., Kahmin, A., & Shuen, Y. (2024). Factors aecting the cybersecurity adoption
among players of the maritime industry, Malaysia. International Journal of Advanced Research, 12, 633–640.
https://doi.org/10.21474/IJAR01/19294
Aşan, C. (2024). Developing a measurement scale to assess the perception of cybersecurity among employees
in the maritime industry. Journal of Naval Sciences and Engineering, 20(2), 135–162. https://doi.org/10.56850/
jnse.1485985
Bolbot, V., Kulkarni, K., Brunou, P., Valdez Banda, O., & Musharraf, M. (2022). Developments and research directions
in maritime cybersecurity: A systematic literature review and bibliometric analysis. International Journal of
Critical Infrastructure Protection, 39, 100571. https://doi.org/10.1016/j.ijcip.2022.100571
Cheng, C., Li, Z., Yan, Y., Cui, Q., Zhang, Y., & Liu, Z. (2024). Maritime freight carbon emission in the U.S. using AIS
data from 2018 to 2022. Scientic Data, 11, 542. https://doi.org/10.1038/s41597-024-03391-0
Chupkemi, D., & Mersinas, K. (2024). Challenges in maritime cybersecurity training and compliance. Journal of
Marine Science and Engineering, 12(10), 1844. https://doi.org/10.3390/jmse12101844
Clavijo, V., Patino, C., & Guevara Carazas, F. (2024). Cybersecurity at sea: A literature review of cyber-attack impacts
and defenses in maritime supply chains. Information, 15(11), 710. https://doi.org/10.3390/info15110710
Computer Fraud and Abuse Act, 1986. U.S. Department of Justice. https://www.justice.gov/jm/
jm-9-48000-computer-fraud
Convention on Cybercrime, 2001. Council of Europe. https://rm.coe.int/1680081561
Crawford, D., & Sylvanus, E. (2023). Enhancing cybersecurity in autonomous maritime systems: An analytical
approach to system authentication. Conference: Faculty of Computing and Applied Sciences International
Conference on Sustainable Development Goals, Baze University, Abuja.
Dimakopoulou, A., & Rantos, K. (2024). Comprehensive analysis of maritime cybersecurity landscape based on
the NIST CSF v2.0. Journal of Marine Science and Engineering, 12(6), 919. https://doi.org/10.3390/jmse12060919
Emre, D., Kayişoğlu, G., Acarer, T., Yilmaz Bolat, P., & Nak, A. (2024). Conducting an analysis of maritime
cybersecurity incidents. Turkish Journal of Maritime and Marine Sciences, 10(1), 51–61. https://doi.org/10.52998/
trjmms.1531187
Harish, A. V., Tam, K., & Jones, K. (2025). Literature review of maritime cyber security: The rst decade. Maritime
Technology and Research, 7(2), 273805. https://doi.org/10.33175/mtr.2025.273805
Huang, X., Wen, Y., Zhang, F., Li, H., Sui, Z., & Cheng, X. (2025). Accident analysis of waterway dangerous goods
transport: Building an evolution network with text knowledge extraction. Ocean Engineering, 318, 120176.
https://doi.org/10.1016/j.oceaneng.2024.120176
Ibokette, A., Ogundare, T., Anyebe, A., Folami, O., Odeh, I., & Okafor, F. (2024). Mitigating maritime
cybersecurity risks using AI-based intrusion detection systems and network automation during extreme
environmental conditions. International Journal of Scientic Research and Modern Technology, 3(10), 65–91.
https://doi.org/10.38124/ijsrmt.v3i10.73
International Convention for the Safety of Life at Sea (SOLAS), 1974. International Maritime Organization.
https://www.imo.org/en/About/Conventions/Pages/International-Convention-for-the-Safety-of-Life-at-Sea-
(SOLAS),-1974.aspx
International Maritime Organization. (2017, June 16). Resolution on Maritime cyber risk management in safety
management systems. MSC.428(98). https://wwwcdn.imo.org/localresources/en/OurWork/Security/
Documents/Resolution%20MSC.428(98).pdf
Jepsen, L., Meland, P. H., & Kaloudi, N. (2024). Increasing maritime cybersecurity awareness through game-based
learning. Journal of Physics: Conference Series, 2867, 012050. https://doi.org/10.1088/1742-6596/2867/1/012050
Jiang, X., Xu, H., Zhu, Y., Gu, Y., & Zheng, S. (2025). Lifecycle risk assessment for steel cargo vessel sinkings: An
interpretive structural modeling and fuzzy Bayesian network approach. Journal of Marine Science and
Engineering, 13(1), 165. https://doi.org/10.3390/jmse13010165
Kanwal, K., Shi, W., Kontovas, C., Yang, Z., & Chang, C. (2022). Maritime cybersecurity: Are onboard systems ready?
Maritime Policy & Management, 51(3), 484–502. https://doi.org/10.1080/03088839.2022.2124464
Karaca, I., & Soner, O. (2023). An evaluation of students’ cybersecurity awareness in the maritime industry.
International Journal of 3D Printing Technologies and Digital Industry, 7(1), 78–89. https://doi.org/10.46519/
ij3dptdi.1236264
18 LEX PORTUS VOL 11 ISS 1 2025
Kormych, B., Malyarenko, T., & Wittke, C. (2023). Rescaling the legal dimensions of grey zones: Evidence from
Ukraine. Global Policy, 14(3), 516–530. https://doi.org/10.1111/1758-5899.13233
Kormych, B., Averochkina, T., & Kormych, L. (2024). Black Sea, grain, and two humanitarian corridors:
Unblocking Ukrainian shipping amid the Russian invasion. Small Wars and Insurgencies, 35(8), 1360–1396.
https://doi.org/10.1080/09592318.2024.2384679
Maritime transportation security act, 2002. Congress.gov. https://www.congress.gov/107/plaws/publ295/PLAW-
107publ295.pdf
Martínez, F., Sánchez Crespo, L. E., Parra, A., Rosado, D., & Fernández-Medina, E. (2024). Maritime cybersecurity:
Protecting digital seas. International Journal of Information Security, 23, 1429–1457. https://doi.org/10.1007/
s10207-023-00800-0
Mawer, T., von Solms, S., & Meyer, J. (2024). Identifying the scope of cybersecurity research conducted in the
maritime industry: 2003–2023. International Conference on Cyber Warfare and Security, 19(1), 545–554.
https://doi.org/10.34190/iccws.19.1.2037
Melnyk, O., Onyshchenko, S., Lohinov, O., Ocheretna, V., & Dovidenko, Y. (2022). Basic aspects ensuring
shipping safety. Scientic Journal of Silesian University of Technology. Series Transport, 117, 139–149.
https://doi.org/10.20858/sjsutst.2022.117.10
Melnyk, O., Onyshchenko, S., Onishchenko, O., Shcherbina, O., & Vasalatii, N. (2023). Simulation-based method
for predicting changes in the ship’s seaworthy condition under impact of various factors. In A. Zaporozhets
(ed.) Systems, Decision and Control in Energy V. Studies in Systems, Decision and Control: Vol. 481 (pp. 653–664).
Springer. https://doi.org/10.1007/978-3-031-35088-7_37
Miller, T., Durlik, I., Kostecka, E., Łobodzińska, A., Łazuga, K., & Kozlovska, P. (2025). Leveraging large
language models for enhancing safety in maritime operations. Applied Sciences (Switzerland), 15(3), 1666.
https://doi.org/10.3390/app15031666
Neumann, T. (2024). Cybersecurity in maritime industry. TransNav, 18(4), 765–774.
https://doi.org/10.12716/1001.18.04.02
Nikolov, B. (2024). Approach to developing a maritime cybersecurity virtual training environment. Proceedings
of the 15th International Scientic and Practical Conference “Environment. Technology. Resources”: Vol. 2
(pp. 220–225). https://doi.org/10.17770/etr2024vol2.8039
Park, C., Kontovas, C., Yang, Z., & Chang, C. (2023). A BN-driven FMEA approach to assess maritime cybersecurity
risks. Ocean & Coastal Management, 235, 106480. https://doi.org/10.1016/j.ocecoaman.2023.106480
Patrick, M., Mugisha, E., Mbaga, K., & Likamba, M. (2024). Cybersecurity in Tanzanian maritime operations: Exploring
global best practices and their local adaptation using the cybersecurity capability maturity model (C2M2).
Social Science and Humanities Journal, 8(10), 5688–5697. https://doi.org/10.18535/sshj.v8i10.1421
Peng, P., Xie, X., Claramunt, C., Lu, F., Gong, F., & Yan, R. (2025). Bibliometric analysis of maritime cybersecurity:
Research status, focus, and perspectives. Transportation Research Part E: Logistics and Transportation Review,
195, 103971. https://doi.org/10.1016/j.tre.2025.103971
Petrović, I., & Vujičić, S. (2025). Use of eye-tracking technology to determine dierences between
perceptual and actual navigational performance. Journal of Marine Science and Engineering, 13(2), 247.
https://doi.org/10.3390/jmse13020247
Popova, Y., Cernisevs, O., & Popovs, S. (2024). Impact of geographic location on risks of ntech as a representative
of nancial institutions. Geographies, 4(4), 753–768. https://doi.org/10.3390/geographies4040041
Potamos, G., Stavrou, E., & Stavrou, S. (2024). Enhancing maritime cybersecurity through operational technology
sensor data fusion: A comprehensive survey and analysis. Sensors, 24(11), 3458. https://doi.org/10.3390/
s24113458
Prasetyo, S. D., Prabowo, A. R., & Arin, Z. (2022). The eect of collector design in increasing PVT performance:
Current state and milestone. Materials Today: Proceedings, 63, 1–9. https://doi.org/10.1016/j.matpr.2021.12.356
Progoulakis, I., Nikitakos, N., Rohmeyer, P., Bunin, B., Dalaklis, D., & Karamperidis, S. (2021). Perspectives
on Cyber Security for Oshore Oil and Gas Assets. Journal of Marine Science and Engineering, 9(2), 112.
https://doi.org/10.3390/jmse9020112
Progoulakis, I., Nikitakos, N., Dalaklis, D., & Yaacob, R. (2022). Cyber-Physical Security for Ports Infrastructure.
International Maritime Transport and Logistics Conference, 11(1), 105–114. https://doi.org/10.21622/
MARLOG.2022.11.105
19LEX PORTUS VOL 11 ISS 1 2025
Putra, I. N., Octavian, A., Susilo, A. K., & Santosa, Y. N. (2024). An assessment of cyber resilience in the maritime
domain using system dynamics and analytical hierarchy process (AHP). Transactions on Maritime Science, 13(2).
https://doi.org/10.7225/toms.v13.n02.w06
Putri, S., & Burhanuddin, A. (2023). Maritime cybersecurity: Tantangan dan strategi keamanan maritim Indonesia.
Mandub: Jurnal Politik, Sosial, Hukum dan Humaniora, 2(1), 378–386. https://doi.org/10.59059/mandub.v2i1.940
Qiao, X., Yang, Y., Jin, Y., & Wang, S. (2024). Joint ship scheduling and speed optimization for naval escort operations
to ensure maritime security. Journal of Marine Science and Engineering, 12(8), 1454. https://doi.org/10.3390/
jmse12081454
Sime, T. (2023). A critical reection on African maritime cybersecurity frameworks. Scientia Militaria, 51(3), 1–88.
https://doi.org/10.5787/51-3-1426
Syta, J. (2024). Challenges in providing cybersecurity to port and maritime infrastructure facilities. GIS Odyssey
Journal, 4(1), 131–144. https://doi.org/10.57599/gisoj.2024.4.1.131
Tatar, U., Karabacak, B., Keskin, O. F., & Foti, D. P. (2024). Charting new waters with CRAMMTS: A survey-
driven cybersecurity risk analysis method for maritime stakeholders. Computers & Security, 145, 104015.
https://doi.org/10.1016/j.cose.2024.104015
United Nations. (1982). Convention on the Law of the Sea. https://www.un.org/depts/los/convention_agreements/
texts/unclos/unclos_e.pdf
Xia, A., Guo, C., Li, S., Shen, Y., & Wang, Z. (2024). Research on network security situation prediction and
visualization based on security situation awareness. ACM International Conference Proceeding Series, 287–293.
https://doi.org/10.1145/3689236.3696754
Yousaf, A., & Zhou, J. (2024). From sinking to saving: MITRE ATT&CK and D3FEND frameworks for maritime
cybersecurity. International Journal of Information Security, 23, 1603–1618. https://doi.org/10.1007/
s10207-024-00812-4
Мельник О., Дроздов О., Кузніченко С. Кібербезпека на морському транспорті: перспективи міжнародно-
правового регулювання та заходи протидії. – Стаття.
У статті вивчено систему правових, технічних та організаційних заходів для формування комплексного підходу до
вирішення проблеми кібербезпеки морського транспорту. Авторами висвітлено ключові прогалини у міжнародно-пра-
вовому регулюванні та пропонується створення єдиної правової бази у сфері кіберзагроз у морській транспортній сфері.
Статтю сфокусовано на технічних рішеннях та підкріплено досвідом професійної підготовки у віртуальному середовищі.
Інноваційним став застосований міждисциплінарний підхід, що поєднав технологічні досягнення з соціальними дослі-
дженнями та правовим аналізом. Запропоновано розробку міжнародної конвенції з морської кібербезпеки, стандартизо-
ваного глобального реєстру інцидентів і транснаціональної системи обміну даними. Така системна база отримає вагомий
потенціал для вирішення критичних безпекових проблем та підвищення безпеки світового судноплавства.
Ключові слова: морська кібербезпека, морське право, реагування на інциденти, глобальні стандарти морської
безпеки, міжнародні правові засади.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Maritime operations play a critical role in global trade but face persistent safety challenges due to human error, environmental factors, and operational complexities. This review explores the transformative potential of Large Language Models (LLMs) in enhancing maritime safety through improved communication, decision-making, and compliance. Specific applications include multilingual communication for international crews, automated reporting, interactive training, and real-time risk assessment. While LLMs offer innovative solutions, challenges such as data privacy, integration, and ethical considerations must be addressed. This review concludes with actionable recommendations and insights for leveraging LLMs to build safer and more resilient maritime systems.
Article
Full-text available
This study uses eye-tracking technology (ETT) to investigate discrepancies between seafarers’ perceived and actual performance during simulated maritime operations. The primary objective is to explore how misperceptions regarding the use of navigational tools—such as visual observation, radar, and ECDIS—may contribute to discrepancies in situational awareness, which is critical for safe navigation. By comparing participants’ self-reported perceptions with objective data recorded by ETT, the study highlights cognitive biases that influence navigational decision-making. Data were collected from a simulation scenario involving 32 seafarers with varying levels of maritime experience. The results reveal that participants tend to overestimate their reliance on visual observation and ECDIS, while underestimating their use of radar. These discrepancies may affect decision-making processes and could contribute to an inaccurate perception of situational awareness, although further research is needed to fully establish their direct impact on actual navigational performance. Additionally, the application of ETT identifies differences in the navigational strategies between more and less experienced seafarers, offering insights that could inform the development of training programs aimed at improving situational awareness. Statistical analyses, including Analysis of Variance (ANOVA) and Kruskal–Wallis tests, were conducted to assess the influence of demographic factors on performance. These findings suggest that ETT can be a valuable tool for identifying perceptual biases, potentially improving decision-making and enhancing training for real-world navigational tasks.
Article
Full-text available
Steel cargo vessel sinking accidents (SCVSA) threaten maritime safety and disrupt global steel supply chains. This study integrates interpretive structural modeling (ISM) and fuzzy Bayesian networks (FBN) to evaluate SCVSA risks across the incident lifecycle. ISM identifies hierarchical relationships among multifaceted risk factors. FBN assesses lifecycle risks using fuzzy scoring, modular nodes, and a hierarchical structure, with muti-source data drawn from accident reports, expert opinions, and research studies. Experts estimate probabilities based on observations and causal scenarios involving steel cargo vessels at Shanghai Port. The ISM–FBN framework visualizes hierarchical risk factors and incorporates uncertainty in the data and causal relationships through fuzzy scoring, structural updates, and probability learning. This approach provides a robust and adaptable tool for assessing SCVSA risks, advancing maritime risk assessment methodologies. Key findings identify advanced vessel age, severe weather and sea conditions, and inadequate regulatory oversight as primary root causes. Poor cargo loading and stowage practices are direct contributors. Intermediate risk factors from deeper to surface layers flow from shipping companies to crew and further to vessel and environmental conditions. Multi-stage risk factors include inadequate emergency responses and improper cargo securing. To mitigate these risks, actionable insights are provided, including fleet modernization, enhanced regulatory compliance, crew training, and improved emergency preparedness.
Article
Full-text available
The activities of contemporary financial institutions require significant geographic expansion. Even the increased level of industry digitalisation does not minimise the importance of the physical assets of financial institutions. The environmental factors specific to each geographic region can significantly influence the efficiency of operations of financial institutions. The goal of the article is to determine the impact of the geographic location of physical assets via environmental risks affecting the other risks of fintech as a representative of financial institutions. The impact is determined by the employment of the PLS-SEM model implemented in SmartPLS 4.0 software. The model determines the impact of environmental risks on governance risks, operational risks, human resources and safety risks, ICT risks, compliance risks, and strategic risks. These groups of risks form the latent variables, which comprise the experts' estimation of threats and vulnerabilities impacts and their likelihoods. After testing five hypotheses, two of them were supported-environmental risks impact human resources safety risks and operational risks.
Article
Full-text available
This is a comprehensive review of the current body of work for cyber security in the marine and maritime sectors. Reviews are useful as a field develops, both for those new to the field, and those contributing to a section of the existing body of work. This looks at the phases of research, from exploratory and positional papers in the early 2010s, to the more recent experimental research, and how “maritime cyber security” has branched into subtopics addressing human factors, policy, law, cyber-physical security, and more. In addition to different topics of research, this comprehensive review summaries the focus of those papers, whether they are intended for crewed vessels, uncrewed vessels (above and below the surface), offshore structures (e.g., oil, renewable wind energy), and infrastructure like ports. As a newly developing field, compared to general cyber security or naval engineering, this review also examines the ratio of positional papers, papers that generate knowledge, and papers that summarize existing works to gauge the maturity of the field. This type of review relies on an expert understanding of the existing body of academic literature and its impact on industry and government, instead of applying prescribed systematic review methodology. This review of over three hundred articles concludes with overall findings and suggestions for future research to continue maturing and growing maritime cyber security research. Highlights Instead of using a systematic review to answer a research question, this paper does a comprehensive review of the existing literature to understand the growth of the field. As the first maritime cyber security specific papers were published circa 2013, this is the first review to consider the first decade of maritime cyber research (2013 - 2023) and how the field of research, including its sub-topics, has developed over those years. While not every one of the 300+ found papers were referenced, this is one of largest the most comprehensive reviews, and highlights some of the limitations to the large number of systematic reviews in the field.
Article
Maritime cybersecurity has emerged as a critical and rapidly evolving research field, necessitated by the increasing reliance on digital technologies and interconnectivity within the global maritime industry. In this paper, we adopt a bibliometric analysis method to review the existing academic publications pertaining to maritime cybersecurity, aiming to provide a comprehensive overview of the development status and research focus. The results show that: 1) Research on maritime cybersecurity is currently undergoing significant development; 2) Most articles on marine cybersecurity are published by researchers from North America and Europe, with most of them stem from the US, Norway, and UK; 3) Most international collaborations are limited at a regional level, and the major regions include North America and Europe; 4) Five closely related research keyword communities show that maritime cybersecurity research hotspots focus on transport-related cyber-attacks, autonomous vessel, AIS, maritime communication, and UAV. The above thorough examination of the current research on maritime cybersecurity also shows that there are some weaknesses in existing studies. For example, the research topic of maritime cybersecurity has not yet received adequate attention and the research hotspot is relatively concentrated. Based on the findings, we propose perspectives of the research on maritime cybersecurity from the aspects of the effectiveness of regulations, funding and investment opportunities, digitalization in the maritime industry and cybersecurity, advances in maritime communication systems, and unmanned aerial vehicles and maritime cybersecurity.
Article
The following article focuses on the cybersecurity challenges within ‘heavy’ industries such as civilian ports and maritime infrastructure. Very often, such traditional sectors do not consider cybersecurity to be a priority. With the growing adaptation of modern technologies, the 5th generation of ports is approaching, where the exposition to cybersecurity threats will be huge. Additionally, the losses will not only be visible in ‘cyberspace’ but can cause significant infrastructure damage, injuries or even mass causalities. Or can impact the global supply chain. These threats are new, and often, port management never even had a chance to go through them. By discussing several real-life and imaginary examples, the author wants to highlight the reality of the impact of cybersecurity in-cidents. In his opinion, such examples should be widely distributed and shared not only with the CEO. The article ends with several recommendations to be implemented by port and maritime infrastructure executives.