User:Emgz12

supply chain attack


 * Supply chain attacks occur when trusted third-party vendors who offer services to the supply chain are attacked to obtain vital information from the company. Three different forms of these attacks are: 103
 * Software Supply Chain Attacks: There is an increasing threat of software supply chain cyber-attacks, with millions of people affected and costs averaging $4.45 million per breach globally.
 * Hardware Supply Chain Attacks: When attackers compromise hardware in a supply chain to gain unauthorized access and control of the targeted system or device like processors or routers. The hardware often looks like legitimate products but contains hidden malware.
 * Foreign-Sourced Threats: These threats disrupt the flow of utilities, goods, and services. Organizations connected to foreign vendors should be cautious. In countries like China, government influence over private companies can lead to the inclusion of malicious code in software products. Additionally, these attackers can infiltrate companies to insert code into legitimate products, granting access to sensitive systems when purchased by other countries.

Supply chain attacks are expected to rise in the next few years impacting millions of individuals and resulting in substantial financial losses globally. To prevent something like this from happening it is best to stay vigilant and have strong security measures throughout the supply chain.

103: ^ Fortinet. (2024). ''What are supply chain attacks? examples and countermeasures''. https://www.fortinet.com/resources/cyberglossary/supply-chain-attacksv

104: ^ Gillis, A. S. (2022, October 18). What is a supply chain attack?. Security. https://www.techtarget.com/searchsecurity/definition/supply-chain-attack

105: ^ Lenaerts-Bergmans, B. (2024, April 2). ''What is a supply chain attack? - crowdstrike''. crowdstrike.com. https://www.crowdstrike.com/cybersecurity-101/cyberattacks/supply-chain-attacks/

106: ^ Miller, J. F. (2013, December). Supply Chain Attack Framework and attack patterns. https://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf

107: ^ Pecha, P. (2023, August 24). Supply chain attacks: How to defend against them. RSS. https://www.goodaccess.com/blog/supply-chain-attack-what-is