Supply chain risk in the cybersecurity industry

Assignment Help Basic Computer Science
Reference no: EM131406613

Industry Profile Part: Supply Chain Risk in the Cybersecurity Industry

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

  • Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:
  • Cyber Security Risks in Industrial Supply Chains https://www.securityweek.com/cyber-security-risks-industrial-supply-chains
  • Cybersecurity in the Supply Chain

https://www.lmi.org/CMSPages/‌getfile.aspx?‌nodeguid=‌adf22863-‌fca9-44ae-a93a-c20e21bae1e6&‌

  • Cybersecurity Risks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity? https://www.wiggin.com/‌files/‌30783_‌cybersecurity-‌update-winter-2015.pdf  (pp. 2-3)

  • Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:
  • https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf
  • https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/
  • Cybersecurity: Five lessons learned the hard way https://www.lexology.com/library/detail.aspx?-3783-457a-8ce5-cda2ed9f3dcd
  • Research best practices and recommended strategies and approaches for managing global supply chain risk
  • 10 Supply Chain Risk Management Best Practices https://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1
  • Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace https://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace
  • Managing Risk in Global ICT Supply Chains https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf
  • Supply Chain Risk Management Awareness  https://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

  • An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.
  • A supply chain risks section in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.
  • A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.
  • A best practices section in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.
  • A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Your five to eight page paper is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific content and formatting requirements for this assignment.Industry Profile Part 2:Supply Chain Risk in the Cybersecurity Industry

For thispaper, you will research and report upon the problem of Supply Chain Risk as itpertains to the cybersecurity industry. You will also investigate due diligence and other businessprocesses / strategies which can be used to mitigate the impacts of supplychain risk for companies who produce and sell cybersecurity related productsand services.

Research

1. Global Supply Chain Risks affecting theCybersecurity Industry. Here are some suggested resources to get you started:

a. Cyber Security Risks in Industrial SupplyChainshttps://www.securityweek.com/cyber-security-risks-industrial-supply-chains

b. Cybersecurity in the Supply Chain

https://www.lmi.org/CMSPages/‌getfile.aspx?‌nodeguid=‌adf22863-‌fca9-44ae-a93a-c20e21bae1e6&‌AspxAutoDetectCookieSupport=1

c. CybersecurityRisks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

d. Independent contractors,outsourcing providers and supply chain vendors: The weakest link incybersecurity? https://www.wiggin.com/‌files/‌30783_‌cybersecurity-‌update-winter-2015.pdf (pp. 2-3)

2. Investigate due diligence as it applies to thepurchase of components or services from vendors. Answer the question: how can due diligence processes help a companymanage supply chain risks? Here are some suggested resources:

a. https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf

b. https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/

c. Cybersecurity: Five lessons learned the hardwayhttps://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd

3. Research bestpractices and recommended strategies and approaches for managing global supplychain risk

a. 10 Supply Chain Risk Management BestPracticeshttps://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1

b. Cyber Supply Chain Security: A Crucial StepToward U.S. Security, Prosperity, and Freedom in Cyberspacehttps://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace

c. Managing Risk in Global ICT Supply Chains https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf

d. Supply Chain Risk Management Awareness  https://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

1. An introduction section which provides a briefoverview of the problem of supply chain risk as it pertains to thecybersecurity industry.

2. A supply chain risks section in which youidentify and describe 5 or more specific sources of supply chain risk whichimpact cybersecurity related products and services.

3. A due diligence section in which youaddress the use of diligence processes (investigating suppliers before enteringinto contracts) as a supply chain risk management strategy. Include 5 or morecybersecurity related questions which should be asked of suppliers during thedue diligence process.

4. A best practices section in which youaddress 5 or more best practices for managing global supply chain risks in thecybersecurity industry. You must also provide an evaluation of the expectedbenefits from implementing each of these practices.

5. A summary and conclusions section in whichyou present an overall picture of the supply chain risk problem in thecybersecurity industry and best practices for managing supply chain risks.

Your five toeight page paper is to be prepared using basic APA formatting (including titlepage and reference list) and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Riskentry in your assignments folder. See the sample paper and paper templateprovided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specificcontent and formatting requirements for this assignment.

Reference no: EM131406613

Questions Cloud

Write a function called has_duplicates : Write a function called has_duplicates() that takes a list and returns True if any two items in the list are equal. So for example, has_duplicates([1,7,3,7,4])should return True and has_duplicates(["one","ONE","One"]) should return False.*
Compute the sqnr for the 8- and 16-level quantizers : once to 8 levels and once to 16 levels for a sampling interval Ts = 0.1. Plot the original signal and the two quantized versions on the same graph, and observe the results.
Discuss creation and configuration of organizational units : Discuss the creation and configuration of Organizational Units. Discuss procedures for installing Domain Controllers. Discuss the differences when you are installing to an existing Domain and when you are creating a new domain.
Write about the latest developments and issues : Choose any topic related to the course and write about the latest developments and issues.Use at least five references outside of your textbook (you may use your textbook too, but are not required to).In addition to the required number of pages for t..
Supply chain risk in the cybersecurity industry : For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the im..
What type of strategies should hr management adopt : Define workplace violence. What type of strategies or interventions should HR management adopt to protect employees while at work?
Default to behaving case insensitively : If case_sensitive is False, then it should accept the user's input if it case-insensitively matches an item in the list. If the second argument is omitted, it should default to behaving case insensitively.
Define a function called : Define a function called skip_string() that takes a string (call it string) and an optional positive integer (call it skip_amount). The function should return a string that starts with the first character in string, and then skips skip_amount char..
Sequence of numbers and an optional minimum value : Define a function called all_above(), which takes a sequence of numbers and an optional minimum value, and determines if every number in the sequence is larger than the given minimum value.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the outlet fluid temperatures

Assume the overall heat transfer coefficient is 180 W/m2 K. If the exchanger is operated in counterflow with a heat transfer area of 0.33 m2 , determine the outlet fluid temperatures.

  Write an efficient algorithm for combining two heaps

Write an efficient algorithm for combining two heaps, one with size n and the other with size 1. What is the Big Oh performance of your algorithm?

  The marketing plan guide

This assignment represents Section 2 of the Marketing Plan. Use the Marketing Plan guide to identify the sections of the Marketing Plan and the marketing elements contained therein. This assignment will focus on Section 2 - Marketing Research & Ta..

  Define an array of structures for up to 50 factory employee

A loop that, for every employee, adds 1 to the number of years with the company and adds 50 cents to the hourly wage.

  Creating and editing fonts in multimedia

State and explain three softwares that can be used in creating and editing fonts in multimedia.

  Create a structure array that contains the conversion factor

Create a structure array that contains the conversion factors for converting units of mass, force, and distance between the metric SI system and the British Engineering System.

  Write a statement to print the counter value

Write a For loop such that the loop till iterate from 1000 to 1 decrementing the counter by 1 each time through the loop. Inside the loop, write a statement to print the counter's value to the Output window.

  Explaining project manager-s role in project management

Describe in scholarly detail project manager's role in project management and job responsibilities related with position.

  Implement normal environment reflection or shadow mapping

This chapter is just a jumping off point for numerous reading and coding projects. For example, you can implement normal, environment, reflection or shadow mapping.

  What do the following commands do

What do the following commands do

  Define an intelligent network

Briefly define an "intelligent" network and a "stupid" network. Why is the Internet a stupid network? How do the two types differ in terms of security and privacy qualities?

  Are there names or numbers used in internet service addressi

Are there names or numbers used in Internet Service Addressing (websites, and other Internet applications)? Explain your answer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd