Cyber security Risks and Evolution of Supply Chains
Keywords:
Cyber security in supply chain, cyber security practices, cyber security risks, Cyber security risks in supply chain.Abstract
Traditionaldata security hones are very little helpful if any equipment or programming part of the system is worked to send the internal data to outside of the system or welcome gatecrashers purposefully. This sort of indirect access passage might be confined if legitimate examination of the system segments, observing of inventory network steps, history check of system part providers is done appropriately. To address the above issues, there is need of standard digital security hone structures, digital security rules in store network administration to relieve the digital security chances in the production network of the system segments. In this paper, need of digital security rehearse structure, Strategies, Road Map and answers for resolve the dangers of Cyber security in store network are examined and analysed.
References
- David Inserra and Steven P. Bucci (2014), “Cyber Supply Chain Security: A Crucial Step Toward U.S.Security, Prosperity, and Freedom in Cyberspace” Backgrounder.
- http://www.govtech.com/security/5-Step s-to-Cyber-Security.html
- http://www.itgovernance.co.uk/cyber-sec urity-risk-assessments-10-steps-to-cyber-security.aspx
- https://staysafeonline.org/re-cyber/cyber-risk-assessment-management/
- CANSO Cyber Security and Risk Asse -ssment Guide, June 2014
- https://www.bitsighttech.com/blog/supplychain-risk-management
- http://www.supplychain-quarterly.com/topics/Technology/201506- 22-is-your-supply-chain-safe-fromcyberattacks/
- https://www.nist.gov/sites/default/files/documents/2016/09/16/huawei_rfi_supply_chain.pdf
- http://www.prnewswire.com/news-releases/huawei-introduces-cyber-security-top-100-requirementsfor-selecting-suppliers-300174398.html3.
- http://www.brookings.edu/research/papers/2011/05/hardware-cybersecurity
- http://pr.huawei.com/en/conne cting-the-dots/cyber-s ecurity/hw 30548.htm#.WBxYsi197IU
- http://www.cambridgewireless.co.uk/Presentation/SecDefSIG_29.09.15_DaveFrancis_Huawei.pdf
- Cyber-security risks in the supply chain, CERT-UK report 2015. ( https://www.cert.gov.uk/wpcontent/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf
- James J. Cebula Lisa R. Young (2010), A Taxonomy of Operational Cyber Security Risks, report ofCarnegie Mellon University.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.