A supply chain attack is a cyberattack that targets less secure elements of an organization, be it their third-party API integrations, remote manufacturing facilities, and specifically, weak networks and systems. The term “supply chain” often elicits thoughts of manufacturing processes and logistics, or the process of getting goods such as groceries from the farmer’s fields to the shelves of a grocery store. In cybersecurity, the supply chain refers to all of the above and more, including hardware and software that ends up in the hands of consumers, businesses, and governments.
This is a slimmed down version of an essay written in early 2017 by Bryan for his Master of Cybersecurity degree at Purdue University.
Every department store, clinic, bank, or website a person interacts with involves some form of storing of personally identifiable information. It is common for everyone to trust the organizations with whom they do business, accepting a certain level of risk by allowing those organizations to store and use their personal information.
This is a slimmed down version of an essay written in early 2017 by Bryan for his Master of Cybersecurity degree at Purdue University.
The stock market crash of 1929 that led to the Great Depression of the early 1930’s also led to the creation of the Securities Exchange Act of 1934 [4]. From the Securities Exchange Act came the Securities and Exchange Commission (SEC) tasked with not only restoring confidence in the financial markets, it defined and enforced laws regarding investments in publicly traded companies, specifically, the placement of investors first above the needs and owners of the business [4].