Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please Reply to post W/150 wrds Cyber vulnerabilities are weaknesses in a system, either hardware or software, that allow for exploitation of a computer system.

Please Reply to post W/150 wrds

Cyber vulnerabilities are weaknesses in a system, either hardware or software, that allow for exploitation of a computer system. This exploitation can come in the form of hacking, or simply taking advantage of a perceived weakness. There are many different types of cyber attack, and there are many documented cases of these attacks having a serious financial impact on their targets.

Software vulnerabilities can come from third party vendors, or from an insider threat, or from a myriad of other digital opportunities. Many times the insider threat comes from someone that does not even intend to damage the company. Careless or uneducated employees can fall victim to phishing, whaling, trojan attacks, or spillage, many times without the employee even understanding what they have done. Most large corporations have training specifically to train employees to protect themselves and the company against malicious attack.

Cyber vulnerabilities in supply chain management and logistics are not limited to the virtual/digital attacks. Physical vulnerabilities can also place a logistics organization in a bad position. When I was working in security for a casino our slot machines were delivered by a small semi-truck and was considered a huge physical security risk because the truck didn't have any security. They mitigated this risk by installing a panic button in the cab of the truck that would be activated every time the truck was full of machine. If the button was pressed, it would notify a few different agencies, who would respond as quickly as possible. This technology could be implemented in supply chains carrying expensive or sensitive equipment or materials. I'm sure something like this is already in effect for transportation of nuclear goods.

Cyber vulnerabilities can come in many shapes and sizes, but all of them can cause serious harm to the infrastructure of a logistics organization. Rigorous training and employee education are necessary, as well as physical security hardening, to prevent access to, and exploitation of supply chain systems.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Ethics Theory and Contemporary Issues

Authors: Barbara MacKinnon, Andrew Fiala

8th edition

9781305162846, 1285196759, 1305162846, 978-1285196756

More Books

Students also viewed these General Management questions

Question

What is broad averaging and what consequences can it have on costs?

Answered: 1 week ago

Question

6. Contrast and compare the RNR and GLM models of rehabilitation.

Answered: 1 week ago