Industry 0 and the emergence of Logistics 0



Download 0,62 Mb.
Pdf ko'rish
bet14/18
Sana20.07.2022
Hajmi0,62 Mb.
#829735
1   ...   10   11   12   13   14   15   16   17   18
Bog'liq
S2000008 en

11
FA L
also be conducive to a more efficient regional transport system, better process security, 
and greater competitiveness for all participants (Pérez-Salas, 2013).
IV. International standards and best practices in the 
introduction of technological rules
Suitably managing technological standards, encouraging cooperation and 
introducing international best practices are fundamental to the introduction of 
technological rules and the provision of guidelines for adequate security in line with 
the speed of changes in these areas.
Hence, for example, the technical committee of the International Organization for 
Standardization (ISO) and the International Electrotechnical Commission (IEC) have 
developed international standards for the Internet of Things (ISO/IEC JTC 1, 2014) and an 
Internet of Things Reference Architecture (ISO/IEC 30141), published in 2016. The Institute 
of Electrical and Electronics Engineers Standards Association (IEEE-SA) has also formed a 
working group with the aim of developing a standard for an architectural framework for 
the Internet of Things, IEEE P2413 (IEEE-SA, 2016). 
Since 2017, ISO has sought to standardize the blockchain and distributed ledger 
technologies (ISO/TC 307 - Blockchain) based on the following structure: reference 
architecture, taxonomy and ontology, use cases, security and privacy, identity, smart 
contracts, governance of blockchain and distributed ledger technologies, interoperability 
of blockchain and distributed ledger technologies, terminology. The International 
Telecommunication Union (ITU) has also expressed interest in standardizing blockchain 
technology. The ITU Telecommunication Standardization Sector (ITU-T) has also set 
up a focus group on application of distributed ledger technology (FG DLT), which will 
develop a workplan for the standardization of interoperable services based on distributed 
ledger technology (ITU-T, 2017). IEEE-SA is also developing a standard for the framework 
of blockchain use in the IoT (IEEE-SA, 2017), and the Linux Foundation along with other 
companies has worked to create an open source platform called the Hyperledger Project 
based on blockchain technology for a distributed ledger that can be used in multiple 
industries, and is optimized for myriad use cases (Linux Foundation, 2016).
There are also cyberrisk management standards, such as ISO/IEC 27001 established by the 
International Organization for Standardization (ISO) and the International Electrotechnical 
Commission (IEC), which establishes the requirements for an information security 
management system. It advocates for the combination of three pillars: people, processes 
and technology. As regards people, organizations must provide cybersecurity training 
for employees to prevent and reduce cyberthreats. In terms of processes, information 
technology must be used to define and audit organizations’ activities, functions and 
documents used to mitigate cybersecurity risks. Lastly, with regard to technology, after 
identifying the cyberthreats facing organizations, plans must be implemented to address 
these threats and reduce the impact of a possible attack.
BIMCO has created guidelines to incorporate cyberprotection into ships’ safety management 
systems, including risk assessments of operational technology, navigation systems and 
engine controls, and also provides a guide on addressing cyberrisks for ships deriving from 
other elements of the supply chain. These guidelines are based on the following principles: 
(i) awareness of the security and commercial risks arising from the lack of cybersecurity 
measures, (ii) protection of IT infrastructure on-board ships and of connected equipment
(iii) a user authentication and authorization system to guarantee appropriate access to the 
necessary information, (iv) protection of data used on-board the ship, guaranteeing suitable 
protection based on the sensitivity of information, (v) management of IT users, to ensure 
that only authorized persons have access and rights to information, (vi) management 
of communication between the ship and coastal areas, and (vii) development and 
implementation of a response plan to cyberincidents based on risk assessment.


w w w . c e p a l . o r g / t r a n s p o r t e

Download 0,62 Mb.

Do'stlaringiz bilan baham:
1   ...   10   11   12   13   14   15   16   17   18




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish