Have a personal or library account? Click to login
Formulas for counteracting cyber threats in regards to computer products supply chains Cover

Formulas for counteracting cyber threats in regards to computer products supply chains

Open Access
|Aug 2022

References

  1. Cavalancia N. (2021). What is a vulnerability management program and should your business have one?. Retrieved from https://cybersecurity.att.com/blogs/security-essentials/what-is-avulnerability-management-program.
  2. Colicchia C., Creazza A., Menachof D., A. (2018). Managing cyber and information risks in supply chains: insights from an exploratory analysis. Supply Chain Management, pp. 4-8
  3. Gillis, A. S. (2021). Supply chain attack. Retrieved from https://www.techtarget.com/searchsecurity/definition/supply-chain-attack?_gl=1*3bpr49*_ga*MTA4MjQ5NDM0MC4xNjQxMjEwNDE0*_ga_TQKE4GS5P9*MTY0MTIxMDQxNC4xLjAuMTY0MTIxMDQxNC4w&_ga=2.230343967.2021077285.1641210415-1082494340.1641210414.
  4. Hassan N. A. (2019). Ransomware Revealed. APress. pp. 25-4010.1007/978-1-4842-4255-1
  5. Jibilian, I., & Canales, K. (2021). The US is readying sanctions against Russia over the SolarWinds cyber attack. Here’s a simple explanation of how the massive hack happened and why it’s such a big deal. Retrieved from https://www.businessinsider.com/solarwinds-hackexplained-government-agencies-cyber-security-2020-12.
  6. Kozak, K., Kwon, B. J., Kim, D., & Dumitras, T. (2019). Issued for Abuse: Measuring the Underground Trade in Code Signing Certificates. Retrieved from https://arxiv.org/pdf/1803.02931.pdf.
  7. Lakshmanan R. (2021). Several Malicious Typosquatted Python Libraries Found On PyPI Repository. Retrieved from https://thehackernews.com/2021/07/several-malicioustyposquatted-python.html.
  8. Mcquade, M. (2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-codecrashed-the-world/.
  9. Nadeau M. (2021). Cryptojacking explained: How to prevent, detect, and recover from it. Retrieved from https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-preventdetect-and-recover-from-it.html.
  10. Parizo, E. (2021). SolarWinds Hack Lessons Learned: Finding the Next Supply Chain Attack. Retrieved from https://www.darkreading.com/omdia/solarwinds-hack-lessons-learnedfinding-the-next-supply-chain-attack
  11. Rasner G., C. (2021). Cybersecurity and Third-Party Risk: Third Party Threat Hunting. Wiley. pp. 20-39
  12. Satariano, A., & Perlroth, N. (2019). Big Companies Thought Insurance Covered a Cyberattack. They May Be Wrong. Retrieved from https://www.nytimes.com/2019/04/15/technology/cyberinsurance-notpetya-attack.html.
  13. Serbu, J. (2021). Pentagon believes it escaped unscathed from SolarWinds, Microsoft hacks. Retrieved from https://federalnewsnetwork.com/cybersecurity/2021/04/pentagon-believesit-escaped-unscathed-from-solarwinds-microsoft-hacks/.
  14. Shields G. (2020). Risk Management: The Ultimate Guide to Financial Risk Management as Applied to Corporate Finance, Hardcover. Bravex Publications. pp. 12-17
Language: English
Page range: 1420 - 1428
Published on: Aug 8, 2022
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2022 Gabriela Ioana Enache, published by Bucharest University of Economic Studies
This work is licensed under the Creative Commons Attribution 4.0 License.