Cyber-Attacks and Their Influences on Company’s Supply Chain Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Supply chains can be highly vulnerable to hacking and malware attacks and, depending on the attacker’s motivation, are susceptible to actions aimed at stealing large amounts of money and disrupting business. Yeniyurt and Carnovale (2021) note that cybercriminals are unwilling to slow down the growth of cyber threats and invent new ways to steal information from individuals and organizations of all sizes. The most common cyber risks in supply chain management include data breaches, supply chain disruption, and malware attacks. Data breaches can occur through external and internal intruders. Employees, hackers, malicious competitors, and managers can leak sensitive data and personal information outside the business. Supply chain disruption occurs when a hacker or attacker breaks into an operating system or network without permission. The goal of penetration is to create havoc on the system by deleting, replicating, and corrupting data. Malware attacks can occur with the help of ransomware that blocks the computer until the company pays a certain amount of money.

One of the cyberattack tools is sending a phishing email in order to obtain information. Ghadge et al. (2020) assert that clicking on a link in an email may result in data corruption and loss. If the phishing email is successful, the company can find the username and password used externally to collect information on the system. It can lead to unforeseen competition and serious leaks that could harm the entire corporation.

The sophistication of attacks and the complexity of modern IT, using such technologies as virtualization, mobile, and cloud computing, are forcing companies to improve the protection of their information and apply defense-in-depth technologies. According to Gaudenzi and Siciliano (2018), to successfully address cyber risks, a serious cyber and IT risk management strategy is needed that considers various corporate functions. High IT security standards for networks, software, and mobile devices, staff awareness training, ongoing process optimization, and strict access rights management and guidelines help to combat the above cyber risks. In turn, cyber risk insurance is becoming a major factor in IT risk management for many companies to manage residual risks.

A cyber-attack on a company’s supply chain is not only a short-term problem, but it also has medium and long-term consequences. First, cyber-attacks lead to the loss of external information. Cybercriminals obtain information belonging to the platform’s users, which is supposed to be a secure environment. Secondly, cyber-attacks also lead to the loss of inside information. It is a serious problem for the company as its corporate information security will be severely compromised. It may suffer from the theft of internal data or confidential information that is vital to the company’s daily operations.

Thirdly, cyber-attacks lead to the deterioration of the company’s reputation. If users have their data stolen from an external platform, then they are unlikely to trust this platform in the future. Fourth, cyber-attacks lead to serious sanctions for the company. While there is no comprehensive national privacy law in the United States, there are several sector-specific data privacy and security laws at the federal level. Moreover, there are many other state and local privacy laws. Thus, the relevant authorities closely monitor companies that violate these requirements. One of the consequences of identity theft can be the recognition that the company has violated the law, as a result of which it may face multimillion-dollar fines.

References

Gaudenzi B., & Siciliano G. (2018). Managing IT and cyber risks in supply chains. In Y. Khojasteh (ed.) Supply chain risk management (pp. 85-96). Springer.

Ghadge, A., Weiß, M., Caldwell, N.D., & Wilding, R. (2020). Managing cyber risk in supply chains: A review and research agenda. Supply Chain Management, 25(2), 223-240. Web.

Yeniyurt, S., & Carnovale, S. (2021). Cyber security and supply chain management: Risks, challenges, and solutions. World Scientific Publishing Company.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, December 27). Cyber-Attacks and Their Influences on Company’s Supply Chain. https://ivypanda.com/essays/cyber-attacks-and-their-influences-on-companys-supply-chain/

Work Cited

"Cyber-Attacks and Their Influences on Company’s Supply Chain." IvyPanda, 27 Dec. 2022, ivypanda.com/essays/cyber-attacks-and-their-influences-on-companys-supply-chain/.

References

IvyPanda. (2022) 'Cyber-Attacks and Their Influences on Company’s Supply Chain'. 27 December.

References

IvyPanda. 2022. "Cyber-Attacks and Their Influences on Company’s Supply Chain." December 27, 2022. https://ivypanda.com/essays/cyber-attacks-and-their-influences-on-companys-supply-chain/.

1. IvyPanda. "Cyber-Attacks and Their Influences on Company’s Supply Chain." December 27, 2022. https://ivypanda.com/essays/cyber-attacks-and-their-influences-on-companys-supply-chain/.


Bibliography


IvyPanda. "Cyber-Attacks and Their Influences on Company’s Supply Chain." December 27, 2022. https://ivypanda.com/essays/cyber-attacks-and-their-influences-on-companys-supply-chain/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1