IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Securing the Supply Chain: Cybersecurity Strategies for Logistics Resilience

Securing the Supply Chain: Cybersecurity Strategies for Logistics Resilience
View Sample PDF
Author(s): Siva Raja Sindiramutty (Taylor's University, Malaysia), Chong Eng Tan (Universiti Malaysia Sarawak, Malaysia), Wei Wei Goh (Taylor's University, Malaysia), Sumathi Balakrishnan (Taylor's University, Malaysia), Norhidayah Hamzah (Taylor's University, Malaysia)and Rehan Akbar (Florida International University, USA)
Copyright: 2024
Pages: 66
Source title: Navigating Cyber Threats and Cybersecurity in the Logistics Industry
Source Author(s)/Editor(s): Noor Zaman Jhanjhi (School of Computing Science, Taylor’s University, Malaysia)and Imdad Ali Shah (School of Computing Science, Taylor’s University, Malaysia)
DOI: 10.4018/979-8-3693-3816-2.ch011

Purchase

View Securing the Supply Chain: Cybersecurity Strategies for Logistics Resilience on the publisher's website for pricing and purchasing information.

Abstract

The exponential growth of digital connectivity in the logistics landscape has heightened the significance of cybersecurity. This chapter delves into the intricate fabric of securing supply chains against evolving cyber threats, aiming to equip logistics professionals with actionable strategies for resilience. Beginning with analysing the prevailing cyber threat landscape, it illuminates common vulnerabilities and highlights recent impactful attacks targeting supply chains. Understanding the nexus between cybersecurity and logistics resilience becomes pivotal, emphasizing the need for continuous operations amidst adversities. To fortify this resilience, the chapter meticulously navigates through risk assessment methodologies, mitigation strategies, and the imperative role of supply chain visibility. It elaborates on vendor and partner management protocols, advocating for stringent cybersecurity considerations within contractual agreements. Moreover, it outlines robust incident response plans and recovery strategies essential for mitigating cyber incidents' ramifications.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom