Securing the Information Supply Chain
Securing the Information Supply Chain
Internet technologies are now indispensable communications tools within and between companies. Yet the openness of these networks and the high potential value of corporate and personal information make these systems a tempting target for criminals, terrorists, and state-sponsored espionage. Cyber-criminals can gain access to a company’s information through its supply chain partners’ information systems. Furthermore, the rise of the Internet-of-Things, with digital “smarts” being added to ever more consumer products and industrial systems, creates physical vulnerabilities rooted in digital vulnerabilities. This chapter describes these threats and offers potential solutions on how to secure the information supply chain.
Keywords: Cyber-security, Internet-of-Things, Digital vulnerability, Cybercrime, Terrorism, Cyber-espionage
MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.
Please, subscribe or login to access full text content.
If you think you should have access to this title, please contact your librarian.
To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.