[PAPER] A Must-Read for the Maritime Industry! Review of "A Study on Cyber Security Requirements of Ship Using Threat Modeling"

📄 Paper Review STRIDE Threat Modeling Ship Cybersecurity

A Study on Cyber Security Requirements of Ship Using Threat Modeling

Korea University Graduate School of Information Security

Captain Ethan
Maritime 4.0 · AI, Data & Cyber Security
📅February 22, 2026
Paper Details
Title A Study on Cyber Security Requirements of Ship Using Threat Modeling
Institution Korea University Graduate School of Information Security
Framework STRIDE Threat Modeling
Stakeholders Shipbuilders · Shipowners · Port Operators · Classification Societies
Source KoreaSCIENCE ↗
※ This review reflects the reviewer's independent analysis and does not represent the views of the original authors.

Maritime cybersecurity is no longer a matter of future preparation. It is a present operational reality—one that the maritime industry has been slow to confront at the structural level. This paper applies the STRIDE threat modeling framework to the maritime operating environment, mapping six threat categories against ship systems including ECDIS, AIS, and VSAT, and deriving actionable security requirements for each major stakeholder group.

Contents of This Review
  1. What This Paper Actually Does
  2. The Threat Landscape, as Mapped by STRIDE
  3. Why the Structural Argument Matters
  4. Security Requirements: What the Paper Recommends
  5. Assessment: What This Paper Gets Right — and What the Industry Must Do Next
  6. Closing Reflection

⚓ (1) What This Paper Actually Does

The research applies the STRIDE threat modeling framework—a structured methodology for identifying security vulnerabilities across information systems—to the maritime operating environment. What makes this approach compelling is that STRIDE forces specificity: rather than speaking broadly about "cyber risk," the framework demands that each threat be categorized and attributed.

The six threat categories are mapped against the systems that modern vessels now depend on: ECDIS, AIS, VSAT communications, and the IT/OT integration layers that connect them.

The scope is deliberately multi-stakeholder. This is not a paper written for one audience. It speaks to shipbuilders at the design phase, shipowners during operations, ports as interconnected infrastructure, and classification societies as the regulatory interface between design intent and seaworthiness certification.

🛡️ (2) The Threat Landscape, as Mapped by STRIDE

The paper's contribution is most concrete when it translates abstract threat categories into maritime-specific scenarios. The findings are not speculative—they are substantiated by incidents that have already occurred:

  • S Spoofing — Attackers impersonating shipowners or port system operators to gain unauthorized system access.
  • T Tampering — AIS data manipulation—altering a vessel's reported position or identity, with navigational and legal consequences.
  • R Repudiation — The erasure of digital evidence post-attack, complicating incident investigation and legal accountability.
  • I Information Disclosure — Unauthorized access to cargo manifests, route data, and commercial intelligence.
  • D Denial of Service — Ransomware-type attacks that disable navigation, communication, or engine control systems.
  • E Elevation of Privilege — Credential theft granting attackers administrative-level control over critical ship systems.
Real-World Incidents Referenced in the Paper
2017 · MAERSK
Ransomware attack — $300M in damages, global operations disrupted
2014 · CARGO DATA BREACH
Pirates accessed cargo manifests before vessel hijacking — information disclosure with kinetic consequences
2013 · AIS SPOOFING
Attackers altered ship location data remotely, causing navigational disruptions

🔍 (3) Why the Structural Argument Matters

The paper's deeper contribution lies not in the threat catalog itself, but in what it says about why ships are newly exposed. Traditionally, vessels operated as largely isolated systems. That isolation—while operationally limiting—was also a de facto security posture.

  • ECDIS, AIS, VSAT, remote monitoring, and passenger Wi-Fi now connect the vessel to external infrastructure continuously
  • The boundary between ship and shore has dissolved—operationally and from a security standpoint
  • Every system connected to an external network is a potential attack surface

The question is no longer whether ships can be targeted, but whether the industry has built the governance, technical architecture, and operational culture to manage that exposure. The answer, at present, is: not consistently.


📋 (4) Security Requirements: What the Paper Recommends

The study distills its threat analysis into five structured security requirements—worth reading not as a checklist, but as a set of design and operational principles:

01 · IT / OT Network Segregation

Crew and passenger networks must be architecturally isolated from propulsion, navigation, and cargo systems. This is not a preference—it is a baseline security requirement now codified in IACS UR E26/E27 for newbuildings.

02 · Securing Satellite Communications (VSAT)

VSAT remains one of the highest-risk entry points on a modern vessel. Encrypted communication protocols and multi-factor authentication are the minimum necessary to prevent remote system compromise.

03 · Patch Management and Software Integrity

Maritime operations require a structured approach to software updates—one that accounts for the operational constraints of vessels at sea while maintaining security baselines.

04 · Crew Cybersecurity Awareness and Training

Social engineering remains one of the most effective attack vectors. Crew training must address phishing, credential handling, and anomalous system behavior—not as a compliance exercise, but as operational competency.

05 · Cybersecurity Audits and Regulatory Compliance

IMO resolution MSC-FAL.1/Circ.3, BIMCO guidelines, and IACS URs establish a regulatory framework organizations are now obligated to operate within. Regular audits—not just initial declarations—are required to maintain meaningful security posture over the vessel lifecycle.


🏆 (5) Assessment: What This Paper Gets Right — and What the Industry Must Do Next

This study makes a genuine contribution. It translates a mature information security methodology into a maritime context with sufficient rigor to be useful to practitioners. The multi-stakeholder framing is exactly the kind of structural thinking the industry needs more of.

  • Translates STRIDE into a maritime-specific context with actionable outputs
  • Addresses four distinct stakeholder groups with distinct responsibilities
  • Grounds findings in real-world incidents, not theoretical threat scenarios
SHIPJOBS Position

The real work is in the spaces between compliance requirements: design review, drydocking, crew rotation, and every port call where a USB drive or maintenance laptop connects to an onboard system. Cybersecurity in the maritime context is not a technology problem. It is an operational design problem.


🎯 (6) Closing Reflection

The maritime industry has always managed complex, high-consequence risk—weather, mechanical failure, human error, geopolitical disruption. Cybersecurity is the newest dimension of that risk. Unlike physical threats, it operates invisibly, at scale, and across the boundaries between ship, shore, port, and flag state simultaneously.

What this paper demonstrates is that the analytical tools exist to understand and structure that risk. The STRIDE model, applied with maritime specificity, generates requirements that are actionable. The harder question is whether the organizations responsible for ship design, operation, and certification will build the institutional capacity to apply them—consistently, across vessel types, across flag states, across the operational lifecycle.

That is not a technical question. It is a leadership question.

If you work in shipbuilding, vessel management, port operations, or maritime regulatory affairs, this paper offers a structured foundation for thinking through your organization's cyber exposure. The methodology is transferable. The urgency is real.

— Captain Ethan, ShipPaulJobs

#PaperReview #ThreatModeling #STRIDE #ShipCybersecurity #MaritimeCybersecurity #IACS #IMO #BIMCO #OTSecurity #SmartShip
Captain Ethan
Maritime 4.0 · AI, Data & Cyber Security

Maritime professional focused on the intersection of vessel operations, classification society regulations, and OT/IT cybersecurity. Writing for engineers, consultants, and operators navigating Maritime 4.0 together.

🌐 More Articles ↗

Comments

Provided by ShipJobs (w/ AI )