Preview

Cyber Security in the Supply Chain

Satisfactory Essays
Open Document
Open Document
928 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security in the Supply Chain
Cyber-Security in the Supply Chain
PROC 5000 GRAD FA 2013 Procurement and Acquisition
Professor Claude Wiedower

Table of Contents

Abstract…………………………………………………………………………………………………………………………………..1
The Problem with Cyber-Security Collaboration………………………………………………………………………2
Cyber-Security Training in the Workplace………………………………………………………………………………..3

Abstract

The essence of global supply chains require that businesses large and small, exchange information of a precarious nature with numerous suppliers, several of which are vastly removed from the manufacturer. A company’s ability to protect sensitive information fluctuates based on the needs of the organization. Businesses and government have all adapted to the world of cyber connectivity, and are all garnering the benefits from social networking and ecommerce. The risks involved with maintaining good cyber-security continue to grow as senior managers and world leaders try to find better sources of dealing with internet predators. Large corporations have intricate supply chains with numerous external suppliers, which make it hard to address all of the risks associated with dealing with each one. With the continued growth of the internet and new information technology, internet scammers have made a concentrated effort to take advantage of any possible weaknesses within a company’s computer infrastructure. Maintaining and enforcing excellent cyber-security measures is at the top of the list for most businesses around the world.

The Problem with Cyber-Security Collaboration
Providing information to suppliers is imperative for businesses and government, even though by doing so they increase the risk for potential cyber invasion. According to Chief Executive Officer, Michael de Crespigny with the Information Security Forum, 40 percent of the data security breaches experienced by organizations arise from attacks on their suppliers (Robert J. Bowman, Supply ChainBrain, May 20, 2013). Many

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Global Limited has a reputation of being one of the world’s leading providers of infrastructure information systems, software, and services around the world. They are in need of a better business and security practices. They have identified a problem which has been likened to a game of Whack-a-mole. To help with its security problem, Global as called upon the knowledge of CIS-its own Security Division. One of the first steps is to understand what information is critical to the business initiatives. Global Cadence is front-end for over 40 applications and has for 200,000 registered users. Global is working to minimize its impact.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3230 Final Project

    • 687 Words
    • 2 Pages

    Integrated Distributors Incorporated is facing a lot of challenges. The IT infrastructure has a lot of outdated hardware and software in multiple locations. This greatly increases security risks and exposes confidentiality, integrity, and availability. Some network compromises have ensued due to the outdated hardware and software. Sensitive and strategic information has been leaked to the public and it is time we put an end to this.…

    • 687 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Lateral information • Information gathered from other bidders  Procurement • Process of acquiring (purchasing)  Contracts • Legal agreements between provider and client IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved.…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    chapter 6 case study

    • 387 Words
    • 2 Pages

    There are many things Wal-Mart has done to improve its data communications systems for suppliers. Their chief improvement was the implementation of the sales and inventory data to their suppliers. Suppliers could log in and gain access to all of the sales and inventory data to more efficiently stock Wal-Mart with their products. A key component of data security was also implemented with the vendor data site to prevent vendors from accessing each other’s data and compromising proprietary information (Viskovich, 2008, p. 1).…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The Stuxnet Virus

    • 1719 Words
    • 7 Pages

    4. Masters, J. (2011, May 23). Confronting the cyber threat. Council on Foreign Relations Website. Retrieved August 3rd 2011, from:…

    • 1719 Words
    • 7 Pages
    Better Essays
  • Best Essays

    In this modern world, Information Technology forms the integral part of any kind of business. In the 21st century, countries across the globe have come to rely on complex computer networks that form the infrastructural backbone of even the most basic necessities of life, including electric power grids, global finance, food distribution, medical care, clean drinking water, petroleum production, and most types of communication. The protection of such networks, known as cyber security, is among the highest priorities in the civilized world, alongside planning and operations for major contingencies, including antiterrorism and land warfare. (Al-Saud, 2012:75).In Middle East region, the IT industry is dynamically growing along with their Economic growth. Due to this growth, competition has also amplified and hence cyber security plays a significant role here. In recent year there has been an unprecedented volume of malicious code and attacks (Anne Harding. accessed January/10 2012).Hence,the investments made on cyber security has increased, and the estimated IT security business in GCC is over 500 Million a year (Nordic Industries Development, 2012:5). This paper is an analysis of IT security industry’s strategic approach in GCC. It will evaluate the industry through porter Five Force model and other external strategies. Also, this paper will throws light on the inside-out strategy over outside-in strategy…

    • 4040 Words
    • 17 Pages
    Best Essays
  • Good Essays

    This report is the result of SDI's extensive market and company research covering the global cyber security industry. It provides detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry participants, analysis of the leading companies in the industry, and key news.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    cyber security

    • 3203 Words
    • 13 Pages

    History has shown that wars are won not only by the courage and strength of the men and women on the battlefield; but also, by the evolving technology adopted by the military. In the cyberspace, two distinct regimes emerge for the military. The first regime is the open network with its inherent risks and vulnerabilities which is essential for collaboration, information sharing, logistics etc. The second regime of closed network meets the demands of security, speed of operation and availability of information at the right time and place. To maintain confidentiality, integrity and availability, closed network is air gapped from open network. In addition to these networks, the military is also exposed to commercial off the shelf (COTS) hardware and software products for wireless, cellular phones, computers, networking equipment etc. Therefore, increased dependence of the military on civilian cyberspace capabilities have inherent risks and make them vulnerable to cyber-attacks by attack vectors which are prevalent in commercial/open cyberspace. This paper draws attention to current cyber threats and challenges that the military faces.…

    • 3203 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Espionage

    • 3191 Words
    • 13 Pages

    Cyber espionage is the use of software tools to obtain secret or private information about another government or business competitor. According to a study by research firm SANS Institute, cyber espionage is ranked Number 3 on its Top Five Menaces for 2008. Hence cyber espionage is an increasing concern in today’s society. Over the past decade, globalization has led to an increase in espionage activities. As businesses become global and competition intensifies, the tendency to steal information to gain a competitive edge increases. Another explanation for a rise in espionage levels is the growth of computer technologies. Computers have shortened the time spent to steal data as individuals can download information and save it in a few seconds, as opposed to spending hours secretly duplicating documents. Computers are interconnected via the company’s network, which is linked to an internet, thus increasing the points of entry through which hackers can gain access to information. Besides making confidential information easier to steal, the computer has enhanced the theft. A group of Russian hackers who stole US$10 million from the Citibank computer network commented “A computer is a much better tool than a handgun… it would take us a long time to get $10 million with a handgun.” In the remaining sections of our report,…

    • 3191 Words
    • 13 Pages
    Powerful Essays