Supply chain risk in the cybersecurity industry

Assignment Help Basic Computer Science
Reference no: EM131406613

Industry Profile Part: Supply Chain Risk in the Cybersecurity Industry

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

  • Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:
  • Cyber Security Risks in Industrial Supply Chains https://www.securityweek.com/cyber-security-risks-industrial-supply-chains
  • Cybersecurity in the Supply Chain

https://www.lmi.org/CMSPages/‌getfile.aspx?‌nodeguid=‌adf22863-‌fca9-44ae-a93a-c20e21bae1e6&‌

  • Cybersecurity Risks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity? https://www.wiggin.com/‌files/‌30783_‌cybersecurity-‌update-winter-2015.pdf  (pp. 2-3)

  • Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:
  • https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf
  • https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/
  • Cybersecurity: Five lessons learned the hard way https://www.lexology.com/library/detail.aspx?-3783-457a-8ce5-cda2ed9f3dcd
  • Research best practices and recommended strategies and approaches for managing global supply chain risk
  • 10 Supply Chain Risk Management Best Practices https://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1
  • Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace https://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace
  • Managing Risk in Global ICT Supply Chains https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf
  • Supply Chain Risk Management Awareness  https://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

  • An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.
  • A supply chain risks section in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.
  • A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.
  • A best practices section in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.
  • A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Your five to eight page paper is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific content and formatting requirements for this assignment.Industry Profile Part 2:Supply Chain Risk in the Cybersecurity Industry

For thispaper, you will research and report upon the problem of Supply Chain Risk as itpertains to the cybersecurity industry. You will also investigate due diligence and other businessprocesses / strategies which can be used to mitigate the impacts of supplychain risk for companies who produce and sell cybersecurity related productsand services.

Research

1. Global Supply Chain Risks affecting theCybersecurity Industry. Here are some suggested resources to get you started:

a. Cyber Security Risks in Industrial SupplyChainshttps://www.securityweek.com/cyber-security-risks-industrial-supply-chains

b. Cybersecurity in the Supply Chain

https://www.lmi.org/CMSPages/‌getfile.aspx?‌nodeguid=‌adf22863-‌fca9-44ae-a93a-c20e21bae1e6&‌AspxAutoDetectCookieSupport=1

c. CybersecurityRisks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

d. Independent contractors,outsourcing providers and supply chain vendors: The weakest link incybersecurity? https://www.wiggin.com/‌files/‌30783_‌cybersecurity-‌update-winter-2015.pdf (pp. 2-3)

2. Investigate due diligence as it applies to thepurchase of components or services from vendors. Answer the question: how can due diligence processes help a companymanage supply chain risks? Here are some suggested resources:

a. https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf

b. https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/

c. Cybersecurity: Five lessons learned the hardwayhttps://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd

3. Research bestpractices and recommended strategies and approaches for managing global supplychain risk

a. 10 Supply Chain Risk Management BestPracticeshttps://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1

b. Cyber Supply Chain Security: A Crucial StepToward U.S. Security, Prosperity, and Freedom in Cyberspacehttps://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace

c. Managing Risk in Global ICT Supply Chains https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf

d. Supply Chain Risk Management Awareness  https://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

1. An introduction section which provides a briefoverview of the problem of supply chain risk as it pertains to thecybersecurity industry.

2. A supply chain risks section in which youidentify and describe 5 or more specific sources of supply chain risk whichimpact cybersecurity related products and services.

3. A due diligence section in which youaddress the use of diligence processes (investigating suppliers before enteringinto contracts) as a supply chain risk management strategy. Include 5 or morecybersecurity related questions which should be asked of suppliers during thedue diligence process.

4. A best practices section in which youaddress 5 or more best practices for managing global supply chain risks in thecybersecurity industry. You must also provide an evaluation of the expectedbenefits from implementing each of these practices.

5. A summary and conclusions section in whichyou present an overall picture of the supply chain risk problem in thecybersecurity industry and best practices for managing supply chain risks.

Your five toeight page paper is to be prepared using basic APA formatting (including titlepage and reference list) and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Riskentry in your assignments folder. See the sample paper and paper templateprovided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specificcontent and formatting requirements for this assignment.

Reference no: EM131406613

Questions Cloud

Write a function called has_duplicates : Write a function called has_duplicates() that takes a list and returns True if any two items in the list are equal. So for example, has_duplicates([1,7,3,7,4])should return True and has_duplicates(["one","ONE","One"]) should return False.*
Compute the sqnr for the 8- and 16-level quantizers : once to 8 levels and once to 16 levels for a sampling interval Ts = 0.1. Plot the original signal and the two quantized versions on the same graph, and observe the results.
Discuss creation and configuration of organizational units : Discuss the creation and configuration of Organizational Units. Discuss procedures for installing Domain Controllers. Discuss the differences when you are installing to an existing Domain and when you are creating a new domain.
Write about the latest developments and issues : Choose any topic related to the course and write about the latest developments and issues.Use at least five references outside of your textbook (you may use your textbook too, but are not required to).In addition to the required number of pages for t..
Supply chain risk in the cybersecurity industry : For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the im..
What type of strategies should hr management adopt : Define workplace violence. What type of strategies or interventions should HR management adopt to protect employees while at work?
Default to behaving case insensitively : If case_sensitive is False, then it should accept the user's input if it case-insensitively matches an item in the list. If the second argument is omitted, it should default to behaving case insensitively.
Define a function called : Define a function called skip_string() that takes a string (call it string) and an optional positive integer (call it skip_amount). The function should return a string that starts with the first character in string, and then skips skip_amount char..
Sequence of numbers and an optional minimum value : Define a function called all_above(), which takes a sequence of numbers and an optional minimum value, and determines if every number in the sequence is larger than the given minimum value.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd