Cyber security Risks and Evolution of Supply Chains

Authors

  • Y. Ayyappa  Student, Department of MCA, Sree Vidyanikethan Institute of Management, Tirupati, Andhra Pradesh, India
  • A. J. Rajasekhar  Assistant Professor, Department of MCA, Sree Vidyanikethan Institute of Management, Tirupati, Andhra Pradesh, India

Keywords:

Cyber security in supply chain, cyber security practices, cyber security risks, Cyber security risks in supply chain.

Abstract

Traditionaldata security hones are very little helpful if any equipment or programming part of the system is worked to send the internal data to outside of the system or welcome gatecrashers purposefully. This sort of indirect access passage might be confined if legitimate examination of the system segments, observing of inventory network steps, history check of system part providers is done appropriately. To address the above issues, there is need of standard digital security hone structures, digital security rules in store network administration to relieve the digital security chances in the production network of the system segments. In this paper, need of digital security rehearse structure, Strategies, Road Map and answers for resolve the dangers of Cyber security in store network are examined and analysed.

References

  1. David Inserra and Steven P. Bucci (2014), “Cyber Supply Chain Security: A Crucial Step Toward U.S.Security, Prosperity, and Freedom in Cyberspace” Backgrounder.
  2. http://www.govtech.com/security/5-Step s-to-Cyber-Security.html
  3. http://www.itgovernance.co.uk/cyber-sec urity-risk-assessments-10-steps-to-cyber-security.aspx
  4. https://staysafeonline.org/re-cyber/cyber-risk-assessment-management/
  5. CANSO Cyber Security and Risk Asse -ssment Guide, June 2014
  6. https://www.bitsighttech.com/blog/supplychain-risk-management
  7. http://www.supplychain-quarterly.com/topics/Technology/201506- 22-is-your-supply-chain-safe-fromcyberattacks/
  8. https://www.nist.gov/sites/default/files/documents/2016/09/16/huawei_rfi_supply_chain.pdf
  9. http://www.prnewswire.com/news-releases/huawei-introduces-cyber-security-top-100-requirementsfor-selecting-suppliers-300174398.html3.
  10. http://www.brookings.edu/research/papers/2011/05/hardware-cybersecurity
  11. http://pr.huawei.com/en/conne cting-the-dots/cyber-s ecurity/hw 30548.htm#.WBxYsi197IU
  12. http://www.cambridgewireless.co.uk/Presentation/SecDefSIG_29.09.15_DaveFrancis_Huawei.pdf
  13. Cyber-security risks in the supply chain, CERT-UK report 2015. ( https://www.cert.gov.uk/wpcontent/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf
  14. James J. Cebula Lisa R. Young (2010), A Taxonomy of Operational Cyber Security Risks, report ofCarnegie Mellon University.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Y. Ayyappa, A. J. Rajasekhar, " Cyber security Risks and Evolution of Supply Chains, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.330-335, March-April-2018.