دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor) سری: ISBN (شابک) : 9811231567, 9789811231568 ناشر: World Scientific Publishing Co Pte Ltd سال نشر: 2021 تعداد صفحات: 235 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 12 مگابایت
در صورت تبدیل فایل کتاب Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت سایبری و مدیریت زنجیره تامین: ریسک ها، چالش ها و راه حل ها: 0 (روندها، چالش ها و راه حل ها در مدیریت زنجیره تامین معاصر): 1 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
آسیبپذیریهای سایبری در مدیریت زنجیره تأمین چیست؟ چگونه شرکتها میتوانند ریسک سایبری و چالشهای امنیت سایبری را در تدارکات، تولید و تدارکات مدیریت کنند؟ امروزه واضح است که زنجیره تامین اغلب حوزه اصلی آسیبپذیری امنیت سایبری یک شرکت و اولین خط دفاعی آن است. این کتاب چندین متخصص از صنعت و دانشگاه را گرد هم میآورد تا به این مشکل بتاباند و راهحلهایی را برای شرکتهایی که در این دنیای جدید و شجاع فعالیت میکنند دفاع کند. موضوعات خاصی که در این کتاب به آن پرداخته میشود عبارتند از: تعریف دنیای فضای سایبری، درک ارتباط بین عرضه مدیریت زنجیره و امنیت سایبری، پیامدهای امنیت سایبری و مدیریت ریسک زنجیره تامین، \x27 عامل انسانی\x27 در امنیت سایبری زنجیره تامین، دیدگاه اجرایی امنیت سایبری، ملاحظات امنیت سایبری در تدارکات، تدارکات و تولید در میان سایر زمینهها.
What are the cyber vulnerabilities in supply chain management? How can firms manage cyber risk and cyber security challenges in procurement, manufacturing, and logistics?Today it is clear that supply chain is often the core area of a firm\x27s cyber security vulnerability, and its first line of defense. This book brings together several experts from both industry and academia to shine light on this problem, and advocate solutions for firms operating in this brave new world.Specific topics addressed in this book include: defining the world of cyber space, understanding the connection between supply chain management and cyber security, the implications of cyber security and supply chain risk management, the \x27human factor\x27 in supply chain cyber security, the executive view of cyber security, cyber security considerations in procurement, logistics, and manufacturing among other areas.
Contents Introduction Cybersecurity & Supply Chain Management: What’s the Big Deal? References Chapter 1 A Philosophical Examination on the Definition of Cyberspace 1.1. Introduction 1.2. How Did We Get Here? A Brief History of Cyberspace 1.3. Defining Cyberspace 1.4. The Body of Cyberspace 1.5. The Mind of Cyberspace 1.6. Conclusion References Chapter 2 Connecting Supply Chain Management to Cybersecurity 2.1. Introduction 2.2. Cyber Risks 2.3. Theoretical Frameworks for Cyber Risks 2.4. Implications for Supply Chains 2.5. Ways of Managing Cyber Risks in Supply Chains 2.6. Supply Chain Cyber Risk Management 2.7. Supply Chain Cyber Resilience 2.8. Supply Chain Aspects of IT-security Standards 2.9. Conclusion References Chapter 3 Cyber Hygiene Leadership in Organizations 3.1. NotPetya 3.2. Company-wide Risks of Cybersecurity in Supply Chain 3.3. Germ Theory 3.4. Supply Chain Cyber Risk is a Third-Party Risk 3.5. ASUS Supply Chain Attack 3.6. Compromising Technology Services 3.7. Compromising Legal Services 3.8. Compromising Cloud Computing 3.9. Managing the Cybersecurity of a Supply Chain 3.9.1. Cyber liability insurance policy 3.9.2. Implement NIST cybersecurity framework 3.9.3. Attorney–client privilege 3.9.4. Supply chain risk management (ID.SC) activity 3.9.5. Implement third-party cyber risk management 3.10. Cyber Risk Management of Cloud Computing 3.11. Contractual Firewalls 3.12. Implement Strong Measures Against Malicious Code 3.13. Takeaways References Chapter 4 Humans of the Supply Chain: The First Frontier in the Battle Against Cyber Vulnerabilities 4.1. Introduction 4.2. Defining Social Sustainability Within the Cybersecurity Context 4.3. Dynamics and Complicating Factors 4.4. Discussion of Management Strategies Within the Supply Chain 4.5. Closing Thoughts and Future Research Areas References Chapter 5 An Ontology of Supply Chain Cybersecurity 5.1. Introduction 5.2. Literature Review 5.2.1. Supply chain cybersecurity 5.3. Major Themes Related to Supply Chain Risk Management 5.3.1. Supply chain cyber disruptions and cyber harm 5.3.1.1. Supply chain cyber risk and risk management 5.3.1.2. Defining and characterizing cyber risk 5.3.1.3. Supply chain cyber risk taxonomies 5.3.1.4. Cyber risk identification, measurement, and assessment 5.3.1.5. Drivers and consequences of cyber risk 5.3.1.6. Cyber risk management frameworks and best practices 5.3.1.7. Cyber risk mitigation 5.3.1.8. Cyber risk, harm, and attack propagation 5.3.1.9. Challenges faced by firms 5.3.2. Supply chain cyber resilience 5.3.3. National security and supply chain cyber risk 5.4. Major Themes Related to Supply Chain Security 5.4.1. Information flow between firms and actors 5.4.2. Digital and physical asset security 5.4.3. Cyber crime and cyber harm 5.4.4. Supply chain design and visibility FE 5.5. Major Themes Related to IT and Systems 5.5.1. The “cyber” supply chain 5.5.2. IT and system designs 5.5.3. Information systems and human behavior 5.5.4. Industry 4.0/5.0, blockchain, and IoT 5.6. Supply Chain Security 5.7. Supply Chain Risk Management 5.8. An Ontology of Supply Chain Cybersecurity 5.8.1. The cyber supply chain 5.9. Supply Chain Cybersecurity 5.10. Constructs of Supply Chain Cybersecurity 5.10.1. Cyber capabilities 5.10.2. Supply chain cyber visibility, distance, and cyber asset distance 5.10.3. Supply chain attack, harm, and disruption 5.10.4. Supply chain cyber vulnerability and cyber risk 5.10.5. Supply chain cyber propagation constructs 5.10.6. Supply chain cyber robustness and resilience 5.10.7. Supply chain cybersecurity culture, orientation, and national security alignment 5.11. Future Research Direction, Limitations, and Conclusions References Chapter 6 Surviving NotPetya: Global Supply Chains in the Era of the Cyber Weapon 6.1. Introduction 6.2. The Importance of Maritime in Global Supply Chains 6.3. Cyber Vulnerabilities of the Maritime Supply Chain 6.4. Interview with Andy Jones, former Mærsk CISO 6.5. Using the Gift of Hindsight 6.6. Conclusions 6.6.1. Implications for global supply chains 6.6.2. Key recommendations References Chapter 7 The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Pharmaceutical Supply Chains 7.1. Introduction and Background 7.2. Supply Chain: An Introduction 7.2.1. The importance of supply chain 7.2.2. Understanding supply chain risk 7.2.3. Key reasons of supply chain vulnerability 7.2.4. Pharmaceutical drugs and its counterfeit supply chain 7.3. Blockchain — A Disruptive Technology 7.3.1. Consensus models 7.3.2. Attributes of blockchain and its benefits 7.3.2.1. Privacy and security 7.3.2.2. Procurement and contract process 7.3.2.3. Traceability 7.3.2.4. Supply chain logistics and chain of custody transparency 7.4. Unsafe and Counterfeit Medicines Case Study 7.4.1. Pharmaceutical blockchain framework to combat issues 7.4.2. Smart contracts and blockchain 7.4.3. Pharmaceutical CSSM with blockchain 7.4.4. End-to-end pharmaceutical framework combined with CSMM 7.5. Remediation Blockchain and its Framework 7.5.1. Cyber risk standards 7.5.2. Statement of applicability 7.6. IoT/Artificial Intelligence and Role with Blockchain 7.7. Conclusions References Chapter 8 Reducing Cybersecurity Vulnerabilities Through the Use of 12N QR Codes 8.1. Introduction 8.2. Growing Cybersecurity Breaches 8.3. Retail Supply Chain Vulnerabilities — Target and Home Depot 8.4. Cyberattack Strategies 8.4.1. Brute force attacks 8.4.2. Compromised passwords 8.4.3. Phishing 8.4.4. Spear phishing 8.4.5. Social engineering 8.4.6. Supply chain hacks: Installing malware at the source 8.4.7. SQL injection 8.4.8. Distributed denial of service 8.5. Defending Against Cyberattacks 8.5.1. Do not use compromised passwords 8.5.2. Create stronger passwords 8.5.3. Password managers 8.5.4. Careful use of free public WiFi 8.5.5. Vendor anonymity 8.5.6. Up-to-date security patches 8.5.7. Best practices to avoid SQL injection 8.5.8. Encrypt valuable data 8.5.9. Two-factor authentication 8.6. The Importance of Up-To-Date Technology 8.6.1. Operating system updates 8.6.2. Obsolete operating systems still in use 8.6.3. Pirated operating systems 8.7. Supply Chain Cybersecurity Challenges 8.7.1. Smaller suppliers in smaller cities 8.7.2. Supply chain visibility 8.7.3. Blockchain 8.8. 12N Codes: One Label Does It All 8.8.1. Limitations of one-dimensional barcodes 8.8.2. QR codes 8.8.3. 12N Codes: Including many fields in one QR 8.8.4. Generating 12N codes 8.8.5. 12N benefits to customers 8.8.6. Customized, updatable web links 8.8.7. 12N code security features 8.9. More Secure 2-FA Using 12N QR Codes 8.9.1. 2-FA vulnerabilities 8.9.2. 12N enhanced 2-FA 8.10. Avoiding the Need for User Logins 8.10.1. Doing away with user logins 8.11. Summary References Chapter 9 Cybersecurity Challenges in Logistics 9.1. Introduction 9.2. Foundation 9.3. Waves of Digitization 9.4. Traditional Cybersecurity Challenges 9.5. Novel Attack Planes 9.6. Physical Security Innovation 9.7. Call to Action References Index