Cyber security Risks and Evolution of Supply Chains

Authors(2) :-Y. Ayyappa, A. J. Rajasekhar

Traditionaldata security hones are very little helpful if any equipment or programming part of the system is worked to send the internal data to outside of the system or welcome gatecrashers purposefully. This sort of indirect access passage might be confined if legitimate examination of the system segments, observing of inventory network steps, history check of system part providers is done appropriately. To address the above issues, there is need of standard digital security hone structures, digital security rules in store network administration to relieve the digital security chances in the production network of the system segments. In this paper, need of digital security rehearse structure, Strategies, Road Map and answers for resolve the dangers of Cyber security in store network are examined and analysed.

Authors and Affiliations

Y. Ayyappa
Student, Department of MCA, Sree Vidyanikethan Institute of Management, Tirupati, Andhra Pradesh, India
A. J. Rajasekhar
Assistant Professor, Department of MCA, Sree Vidyanikethan Institute of Management, Tirupati, Andhra Pradesh, India

Cyber security in supply chain, cyber security practices, cyber security risks, Cyber security risks in supply chain.

  1. David Inserra and Steven P. Bucci (2014), “Cyber Supply Chain Security: A Crucial Step Toward U.S.Security, Prosperity, and Freedom in Cyberspace” Backgrounder.
  2. http://www.govtech.com/security/5-Step s-to-Cyber-Security.html
  3. http://www.itgovernance.co.uk/cyber-sec urity-risk-assessments-10-steps-to-cyber-security.aspx
  4. https://staysafeonline.org/re-cyber/cyber-risk-assessment-management/
  5. CANSO Cyber Security and Risk Asse -ssment Guide, June 2014
  6. https://www.bitsighttech.com/blog/supplychain-risk-management
  7. http://www.supplychain-quarterly.com/topics/Technology/201506- 22-is-your-supply-chain-safe-fromcyberattacks/
  8. https://www.nist.gov/sites/default/files/documents/2016/09/16/huawei_rfi_supply_chain.pdf
  9. http://www.prnewswire.com/news-releases/huawei-introduces-cyber-security-top-100-requirementsfor-selecting-suppliers-300174398.html3.
  10. http://www.brookings.edu/research/papers/2011/05/hardware-cybersecurity
  11. http://pr.huawei.com/en/conne cting-the-dots/cyber-s ecurity/hw 30548.htm#.WBxYsi197IU
  12. http://www.cambridgewireless.co.uk/Presentation/SecDefSIG_29.09.15_DaveFrancis_Huawei.pdf
  13. Cyber-security risks in the supply chain, CERT-UK report 2015. ( https://www.cert.gov.uk/wpcontent/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf
  14. James J. Cebula Lisa R. Young (2010), A Taxonomy of Operational Cyber Security Risks, report ofCarnegie Mellon University.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 330-335
Manuscript Number : CSEIT1833322
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Y. Ayyappa, A. J. Rajasekhar, "Cyber security Risks and Evolution of Supply Chains", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.330-335, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT1833322

Article Preview

Follow Us

Contact Us