IDEAS home Printed from https://ideas.repec.org/a/vrs/poicbe/v16y2022i1p1420-1428n24.html
   My bibliography  Save this article

Formulas for counteracting cyber threats in regards to computer products supply chains

Author

Listed:
  • Enache Gabriela Ioana

    (Bucharest University of Economic Studies, Bucharest, Romania)

Abstract

Technological evolutions have brought truly meaningful benefits, but also new challenges for which suppliers of computer product supply chains have had to find solutions. Cyber-attacks are being conducted by teams of cybercriminals who are highly skilled in computer science. There have been many episodes where governments of some countries financially supported such an attack on a public company or institution. The cyber-attacks problem is not new, and the economic damage it can do is truly impactful. I’ve undergone an analysis of relevant literature in order to identify the key factors and the limitations that supply chains are facing when it comes to computer products. Following ample research, I’ve formulated the research questions which I believe to be essential in providing answers that can bring contributions to the field: “What are the main challenges that computer products supply chains are facing?”, and “In what way can we limit these attacks?” The results of the analysis classify the challenges in three key dimensions: hijacking updates, undermining code signing, and destroying the free access code. These challenges can be diminished by different strategies of securing the supply chains. I have identified three essential ways to secure the computer products supply chains: risk management, vulnerability management, and practices for disclosing the identified vulnerabilities. The results of the study show that the challenges to public or private organizations can be limited by having a good understanding of the framework behind a cyber attack, as well as close collaboration between the supplier and the customer.

Suggested Citation

  • Enache Gabriela Ioana, 2022. "Formulas for counteracting cyber threats in regards to computer products supply chains," Proceedings of the International Conference on Business Excellence, Sciendo, vol. 16(1), pages 1420-1428, August.
  • Handle: RePEc:vrs:poicbe:v:16:y:2022:i:1:p:1420-1428:n:24
    DOI: 10.2478/picbe-2022-0129
    as

    Download full text from publisher

    File URL: https://doi.org/10.2478/picbe-2022-0129
    Download Restriction: no

    File URL: https://libkey.io/10.2478/picbe-2022-0129?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:vrs:poicbe:v:16:y:2022:i:1:p:1420-1428:n:24. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.sciendo.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.