Security Threats, Countermeasures, and Challenges of Digital Supply Chains

Author:

Hammi Badis1ORCID,Zeadally Sherali2ORCID,Nebhen Jamel3ORCID

Affiliation:

1. EPITA Engineering School, France

2. University of Kentucky, USA

3. Prince Sattam bin Abdulaziz University, KSA

Abstract

The rapid growth ofInformation Communication Technologies (ICT)has impacted many fields. In this context, the supply chain has also quickly evolved toward the digital supply chain where digital and electronic technologies have been integrated into every aspect of its end-to-end process. This evolution provides numerous benefits such as profit maximization, loss reduction, and the optimization of supply chain lead times. However, the use of such technologies has also considerably opened up various security threats and risks which have widened the attack surface on the entire end-to-end supply chain. We present a holistic survey on supply chain security. We discuss the different security issues and attacks that target the different supply chain technologies. Then, we discuss various countermeasures and security solutions proposed by academic and industry researchers to mitigate the identified threats. Finally, we provide some recommendations and best practices that can be adopted to achieve a secure supply chain.

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference241 articles.

1. Risk mitigation in supply chain digitization: System modularity and information technology governance;Xue Ling;Journal of Management Information Systems,2013

2. Digital supply chain: Survey of the literature;Iddris Faisal;International Journal of Business Research and Management,2018

3. Jay Heizer, Barry Render, and Chuck Munson. 2017. Principles of Operations Management: Sustainability and Supply Chain Management (Global editon). Pearson.

4. Jon Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, and James Gimbi. 2021. Key Practices in Cyber Supply Chain Risk Management: Observations from Industry. Technical Report. National Institute of Standards and Technology (NIST). 1–31.

5. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems;Boyson Sandor;Technovation,2014

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3