Security Framework for Supply-Chain Management

2022 ◽  
pp. 587-610
Author(s):  
Kathick Raj Elangovan

In recent times, cyber-attacks have been a significant problem in any organization. It can damage the brand name if confidential data is compromised. A robust cybersecurity framework should be an essential aspect of any organization. This chapter talks about the security framework for cyber threats in supply chain management and discusses in detail the implementation of a secure environment through various controls. Today, a systematic method is used for handling sensitive information in an organization. It includes processes, people, and IT systems by implementing a risk management method. Distinct controls dedicated to different levels of domains, namely human resources, access control, asset management, cryptography, physical security, operations security, supplier relations, acquisition, incident management, and security governance are provided. Companies, contractors, and any others who are part of the supply chain organization must follow this security framework to defend from any cyber-attacks.

Author(s):  
Kathick Raj Elangovan

In recent times, cyber-attacks have been a significant problem in any organization. It can damage the brand name if confidential data is compromised. A robust cybersecurity framework should be an essential aspect of any organization. This chapter talks about the security framework for cyber threats in supply chain management and discusses in detail the implementation of a secure environment through various controls. Today, a systematic method is used for handling sensitive information in an organization. It includes processes, people, and IT systems by implementing a risk management method. Distinct controls dedicated to different levels of domains, namely human resources, access control, asset management, cryptography, physical security, operations security, supplier relations, acquisition, incident management, and security governance are provided. Companies, contractors, and any others who are part of the supply chain organization must follow this security framework to defend from any cyber-attacks.


2021 ◽  
Vol 11 (12) ◽  
pp. 5585
Author(s):  
Sana Al-Farsi ◽  
Muhammad Mazhar Rathore ◽  
Spiros Bakiras

Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. Although, the primary motive of using a blockchain for supply chain management is to reduce the overall production cost while providing the comprehensive security to the system. However, current blockchain-based supply-chain management (BC-SCM) systems still hold the possibility of cyber attacks. Therefore, the goal of this study is to investigate practical threats and vulnerabilities in the design of BC-SCM systems. As a starting point, we first establish key requirements for the reliability and security of supply chain management systems, i.e., transparency, privacy and traceability, and then discern a threat model that includes two distinctive but practical threats including computational (i.e., the ones that threaten the functionality of the application) and communication (i.e., the ones that threaten information exchange among interconnected services of the application). For investigation, we follow a unique approach based on the hypothesis that reliability is pre-requisite of security and identify the threats considering (i) design of smart contracts and associated supply chain management applications, (ii) underlying blockchain execution environment and (iii) trust between all interconnected supply management services. Moreover, we consider both academic and industry solutions to identify the threats. We identify several challenges that hinder to establish reliability and security of the BC-SCM systems. Importantly, we also highlight research gaps that can help to establish desired security of the BC-SCM. To the best of our knowledge, this paper is the first effort that identifies practical threats to blockchain-based supply chain management systems and provides their counter measures. Finally, this work establishes foundation for future investigation towards practical security of BC-SCM system.


2021 ◽  
Author(s):  
Md Abdur Rahman ◽  
Syed M. Belal

Abstract Keeping track of the oil and gas supply chain is challenging task as the route and transportation requires sophisticated security environment - both physical systems’ and IT systems’ security. Thanks to the recent advancement in IoT, specialized sensors can keep track of the required supply chain environment. With the help of blockchain, the supply chain data can be immutably saved for further sharing with stakeholders. Due to the introduction of AI as an embedded element within 6G networks, the end-to-end supply chain process can now be automated for safety, security, and efficiency purposes. By leveraging 6G, AI, blockchain, and IoT, the supply chain data during the transportation or at rest can be monitored for any changed environment during the movement of the ship through national or international routes. In this paper, we study the requirements of such intelligent and secure supply chain management system conducive to the oil and gas industry. We also show our proof-of-concept implementation and initial test results. Our obtained results show promising prospect of the current system to be deployed to safeguard the oil and gas supply chain.


2019 ◽  
Vol 25 (5) ◽  
pp. 1145-1163 ◽  
Author(s):  
Per Engelseth ◽  
Judith Molka-Danielsen ◽  
Brian E. White

Purpose The purpose of this paper is to question the applicability of recent industry-derived terms such as “Big Data” (BD) and the “Internet of things” (IoT) in a supply chain managerial context. Is this labeling useful in managing the operations found in supply chains? Design/methodology/approach BD and IoT are critically discussed in the context of a complete supply chain organization. A case study of banana supply from Costa Rica to Norway is provided to empirically ground this research. Thompson’s contingency theory, Alderson’s functionalistic end-to-end “marketing channels” model, Penrose’s view of supply purpose associated with service provision, and particularities of banana supply reveal how end-to-end supply chains are complex systems, even though the product distributed is fairly simple. Findings Results indicate that the usefulness of BD in supply chain management discourse is limited. Instead its connectivity is facilitated by what is now becoming commonly labeled as IoT, people, devices and documents that are useful when taking an end-to-end supply chain perspective. Connectivity is critical to efficient contemporary supply chain management. Originality/value BD and IoT have emerged as a part of contemporary supply chain management discourse. This study directs attention to the importance of scrutinizing emergent and actual discourse in managing supply chains, that it is not irrelevant which words are applied, e.g., in research on information-enabled supply process development. Often the old words of professional terminology may be sufficient or even better to help manage supply.


Author(s):  
Jabulile R. Kunene ◽  
Dr, S. Govender

The Department of Human Settlements (DoHS) has over the years received reports on lack of proper implementation of the Supply Chain Management, in particular the management of movable assets processes. Asset Management is a sub-component within Supply Chain Management in the DoHS. Asset Management is responsible for the management of all movable assets procured by the department. Movable assets such as departmental vehicles, office furniture, computer sets, are used by the officials in performing their day-to-day functions. Officials in the Department are responsible for the management and safeguarding of the assets assigned to them. The research covered in this article aimed to investigate how the department manages its assets and complies with the transversal policies of Supply Chain Management (SCM), which deal with demand management, acquisition management, utilisation management and disposal management processes. The information covered within this research is from varying records, official documents and departmental policies, dealing directly with the problem at hand, especially the management and monitoring of movable assets. Varying methods of collecting and analysing data were used to achieve valid and reliable results. The researcher analysed and compared various information records that informed findings with regard to risk management and control measures, value for money, responsibility and accountability and intervention strategies that may bring about efficiency and effectiveness in the department with regard to management of movable assets. This was done to address the issue of audit queries received by the Department of Human Settlements.


Sign in / Sign up

Export Citation Format

Share Document