Skip to main content

Securing Your Supply Chain

  • Chapter
  • First Online:
Protective Security
  • 591 Accesses

Abstract

The Defence Manual of Security (Joint Services Publication 440 (JSP 440)) defined an asset as being

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Henderson, G., Malcolm, N. and Roberts, F., 1933. The Science Of War. London: Longmans, Green.

  2. 2.

    www.librarything.com/author/hendersongfr

  3. 3.

    http://wla.1-s.es/uk-mod-jsp-440-2001.pdf

  4. 4.

    www.checkpoint.com/downloads/resources/cyber-attack-trends-mid-year-report-2019.pdf

  5. 5.

    https://whatis.techtarget.com/definition/supply-chain-risk-management-SCRM

  6. 6.

    Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the information (NIST Glossary).

  7. 7.

    www.researchgate.net/figure/An-instance-of-Island-hopping-attack_fig4_256840855

  8. 8.

    www.beyondtrust.com/blog/entry/cybersecurity-strategies-to-stop-lateral-movement-attacks-leave-your-adversaries-marooned

  9. 9.

    https://redpiranha.net/news/software-supply-chain-emerging-attack-vector

  10. 10.

    https://cybersecurityglossary.com/watering-hole-attack/

  11. 11.

    www.ncsc.gov.uk/collection/supply-chain-security/third-party-data-stores

  12. 12.

    https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161.pdf

  13. 13.

    ISACA, 2014. Vendor Management Using COBIT 5. ISACA.

  14. 14.

    https://whatis.techtarget.com/definition/multi-tenancy

  15. 15.

    https://searchcio.techtarget.com/definition/offshore-outsourcing?_ga=2.127542600.494336964.1602952807-1213537619.1588923015

  16. 16.

    https://searchapparchitecture.techtarget.com/definition/service-oriented-architecture-SOA?_ga=2.47825634.494336964.1602952807-1213537619.1588923015

  17. 17.

    assistance@cyberrescue.co.uk

  18. 18.

    assistance@cyberrescue.co.uk

  19. 19.

    https://ihsmarkit.com/products/vendors-third-parties.html

  20. 20.

    https://cset.inl.gov/SitePages/Home.aspx

  21. 21.

    https://securityscorecard.com/resources/atlas-overview

  22. 22.

    https://csrc.nist.gov/Projects/cyber-supply-chain-risk-management/interdependency_tool

  23. 23.

    https://acuitys3.s3.eu-west-2.amazonaws.com/s3fs-public/stream_for_supply_chain_risk_management_2017.pdf

  24. 24.

    www.crest-approved.org/cyber-security-incident-response-maturity-assessment/index.html

  25. 25.

    https://media.bitpipe.com/io_14x/io_148038/item_1970834/Supply_chain_management_balance_shifts_under_Covid.pdf

  26. 26.

    www.theguardian.com/uk/2011/aug/15/inside-camp-bastion

  27. 27.

    www.discoveryuk.com/series/frontline-battle-machines-with-mike-brewer/

  28. 28.

    https://williamamos.wordpress.com/2008/08/19/army-discovered-advanced-rpgs-in-afghanistan/

  29. 29.

    www.reddit.com/r/GunPorn/comments/19r71w/confiscated_ak47s_in_afghanistan_1024x768/

  30. 30.

    www.militaryimages.net/threads/rpk-rpk-74-and-its-derivatives-in-action.9105/

  31. 31.

    www.oxfordmail.co.uk/news/10577570.afghanistan-conflict-troops-risking-lives-chance-normality/

  32. 32.

    www.flickriver.com/photos/defenceimages/6940697111/

  33. 33.

    Para 231. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/311572/20110830_jdp2_00_ed3_with_change1.pdf

  34. 34.

    www.sonatype.com/hubfs/Corporate/Software%20Supply%20Chain/2020/SON_SSSC-Report-2020_final_aug11.pdf

  35. 35.

    https://topclassactions.com/lawsuit-settlements/privacy/ransomware/blackbaud-ransomware-attack

  36. 36.

    www.blackbaud.com/newsroom/article/2020/07/16/learn-more-about-the-ransomware-attack-we-recently-stopped

  37. 37.

    www.bleepingcomputer.com/news/security/blackbaud-ransomware-gang-had-access-to-banking-info-and-passwords/

  38. 38.

    www.csoonline.com/article/3584071/uber-breach-case-a-watershed-moment-for-cisos-liability-risk.html

  39. 39.

    www.tylertech.com/

  40. 40.

    www.tylertech.com/resources/resource-downloads/ransomware-survival-guide

  41. 41.

    www.zdnet.com/article/suspicious-logins-rats-reported-after-ransomware-attack-on-us-govt-contractor/

  42. 42.

    https://web.archive.org/web/20200925001207/https://tylertech.com/

  43. 43.

    https://servicealerts.zen.co.uk/active/1/5589

  44. 44.

    https://energy.economictimes.indiatimes.com/news/power/cant-rule-out-foul-play-sabotage-in-mumbai-power-outage-incident-maharashtra-energy-minister/78655039

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Seaman, J. (2021). Securing Your Supply Chain. In: Protective Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6908-4_11

Download citation

Publish with us

Policies and ethics