IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Securing the Digital Supply Chain Cyber Threats and Vulnerabilities

Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
View Sample PDF
Author(s): Siva Raja Sindiramutty (Taylor's University, Malaysia), Noor Zaman Jhanjhi (Taylor's University, Malaysia), Chong Eng Tan (Universiti Malaysia Sarawak, Malaysia), Navid Ali Khan (Taylor's University, Malaysia), Bhavin Shah (Lok Jagruti University, India)and Loveleen Gaur (University of South Pacific, Fiji)
Copyright: 2024
Pages: 68
Source title: Cybersecurity Measures for Logistics Industry Framework
Source Author(s)/Editor(s): Noor Zaman Jhanjhi (School of Computing Science, Taylor’s University, Malaysia)and Imdad Ali Shah (School of Computing Science, Taylor’s University, Malaysia)
DOI: 10.4018/978-1-6684-7625-3.ch007

Purchase

View Securing the Digital Supply Chain Cyber Threats and Vulnerabilities on the publisher's website for pricing and purchasing information.

Abstract

The digital supply chain has become an integral part of modern business operations, enabling efficient and streamlined processes. However, with the rapid advancement of technology, the supply chain landscape has become increasingly vulnerable to cyber threats and attacks. This chapter explores the critical issue of cybersecurity within the context of the digital supply chain, aiming to equip professionals and practitioners with the knowledge and strategies to safeguard their operations. Lastly, the chapter sheds light on emerging technologies and future trends and concludes with a call to action for securing the digital supply chain. It also highlights the future challenges and directions in cybersecurity for the supply chain, urging professionals to stay vigilant and adapt to evolving strategies and technologies. Overall, this chapter serves as a comprehensive guide for securing the digital supply chain, empowering readers to fortify their operations against cyber threats and ensure the resilience of their supply chain networks.

Related Content

Azeem Khan, Noor Zaman Jhanjhi, Haji Abdul Hafidz B. Haji Omar, Dayang Hajah Tiawa B. Awang Haji Hamid. © 2024. 35 pages.
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, Nicki Gan Wei, Tan Zheng Shen, Yap Zhe Hin, Siva Raja Sindiramutty, Teah Yi Fan Nicole. © 2024. 39 pages.
Sidra Tahir, Anam Zaheer. © 2024. 17 pages.
Tayyab Rehman, Noshina Tariq, Muhammad Ashraf, Mamoona Humayun. © 2024. 24 pages.
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, Rawish Butt, Masooma Anwar, Mamoona Humayun. © 2024. 25 pages.
Sidra Tahir. © 2024. 15 pages.
Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Loveleen Gaur. © 2024. 68 pages.
Body Bottom