Otwarty dostęp

Formulas for counteracting cyber threats in regards to computer products supply chains


Zacytuj

Cavalancia N. (2021). What is a vulnerability management program and should your business have one?. Retrieved from https://cybersecurity.att.com/blogs/security-essentials/what-is-avulnerability-management-program. Search in Google Scholar

Colicchia C., Creazza A., Menachof D., A. (2018). Managing cyber and information risks in supply chains: insights from an exploratory analysis. Supply Chain Management, pp. 4-8 Search in Google Scholar

Gillis, A. S. (2021). Supply chain attack. Retrieved from https://www.techtarget.com/searchsecurity/definition/supply-chain-attack?_gl=1*3bpr49*_ga*MTA4MjQ5NDM0MC4xNjQxMjEwNDE0*_ga_TQKE4GS5P9*MTY0MTIxMDQxNC4xLjAuMTY0MTIxMDQxNC4w&_ga=2.230343967.2021077285.1641210415-1082494340.1641210414. Search in Google Scholar

Hassan N. A. (2019). Ransomware Revealed. APress. pp. 25-4010.1007/978-1-4842-4255-1 Search in Google Scholar

Jibilian, I., & Canales, K. (2021). The US is readying sanctions against Russia over the SolarWinds cyber attack. Here’s a simple explanation of how the massive hack happened and why it’s such a big deal. Retrieved from https://www.businessinsider.com/solarwinds-hackexplained-government-agencies-cyber-security-2020-12. Search in Google Scholar

Kozak, K., Kwon, B. J., Kim, D., & Dumitras, T. (2019). Issued for Abuse: Measuring the Underground Trade in Code Signing Certificates. Retrieved from https://arxiv.org/pdf/1803.02931.pdf. Search in Google Scholar

Lakshmanan R. (2021). Several Malicious Typosquatted Python Libraries Found On PyPI Repository. Retrieved from https://thehackernews.com/2021/07/several-malicioustyposquatted-python.html. Search in Google Scholar

Mcquade, M. (2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-codecrashed-the-world/. Search in Google Scholar

Nadeau M. (2021). Cryptojacking explained: How to prevent, detect, and recover from it. Retrieved from https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-preventdetect-and-recover-from-it.html. Search in Google Scholar

Parizo, E. (2021). SolarWinds Hack Lessons Learned: Finding the Next Supply Chain Attack. Retrieved from https://www.darkreading.com/omdia/solarwinds-hack-lessons-learnedfinding-the-next-supply-chain-attack Search in Google Scholar

Rasner G., C. (2021). Cybersecurity and Third-Party Risk: Third Party Threat Hunting. Wiley. pp. 20-39 Search in Google Scholar

Satariano, A., & Perlroth, N. (2019). Big Companies Thought Insurance Covered a Cyberattack. They May Be Wrong. Retrieved from https://www.nytimes.com/2019/04/15/technology/cyberinsurance-notpetya-attack.html. Search in Google Scholar

Serbu, J. (2021). Pentagon believes it escaped unscathed from SolarWinds, Microsoft hacks. Retrieved from https://federalnewsnetwork.com/cybersecurity/2021/04/pentagon-believesit-escaped-unscathed-from-solarwinds-microsoft-hacks/. Search in Google Scholar

Shields G. (2020). Risk Management: The Ultimate Guide to Financial Risk Management as Applied to Corporate Finance, Hardcover. Bravex Publications. pp. 12-17 Search in Google Scholar

eISSN:
2558-9652
Język:
Angielski