CYBER SECURITY IN SUPPLY CHAIN MANAGEMENT (SCM)
DOI:
https://doi.org/10.31733/2078-3566-2022-6-537-542Keywords:
supply chains, cyber security, information flows, counterparties, cyber threats.Abstract
Cyber security in supply chain management (SCM) is becoming increasingly relevant as today’s companies increasingly use information technology and digital systems. And the supply chains themselves are becoming more and more complex and include more and more participants. With so many points of interaction and third-party suppliers and buyers, it can be difficult to monitor whether all parties are following proper cybersecurity protocols. Therefore, in today’s business environment, cyber security is becoming an integral part of supply chain management. This involves a thorough analysis of potential risks created by external suppliers, buyers and other market participants, logistics and transportation, with further preventive measures to reduce them. Any supply chain is only as strong as its weakest link. Therefore, cyber security measures are mainly aimed at identifying vulnerabilities and eliminating cyber threats in the weakest links of the supply chain. The article deals with the essence of supply chain management and analyzes the role of cyber security in the management system. It is noted, that in modern conditions, cyber security is becoming an element of supply chain management. The main types of risks and cyber threats in supply chains are analyzed, in particular the issue of security of third-party suppliers. Measures to eliminate cyber risks and to increase cyber security in supply chain management are proposed. By taking a proactive approach and implementing strong cybersecurity measures, companies can reduce the risk of cyberattacks and ensure the security of their supply chain.
References
1. Баранов О. А. Про тлумачення та визначення поняття “кібербезпека”. Правова інформатика, 2014. № 2 (42). С. 54-62.
2. Cyber Security Breaches Survey. 2022. URL : https://www.gov.uk/ government/statistics/cyber-security-breaches-survey-2022/cyber-security-breaches-survey-2022.
3. Фурашев В. М. Кіберпростір та інформаційний простір, кібербезпека та інформаційна безпека: сутність, визначення, відмінності. Інформація і право, 2012. № 2. С. 162-169.
4. Дубов Д. В., Ожеван М. А. Кібербезпека : світові тенденції та виклики для України. Київ : НІСД, 2011. 30 с.
5. Потій О. В., Семенченко А. І., Дубов Д. В., Бакалинський О. О., Мялковський Д. В. Концептуальні засади впровадження організаційно-технічної моделі кіберзахисту України. Захист інформації, 2021. Vol. 23, № 1. С. 47-60.
6. Mentzer J. T., DeWitt W., Keebler J. S., Min S., Nix N. W., Smith C. D., Zacharia, Z. G. Defining supply chain management. Journal of Business logistics, 2001. № 22 (2). P. 1-25.
7. Кількість атак на ланцюг постачання зростає: хто під прицілом та як протистояти. ESET. 2021. URL : https://eset.ua/ua/blog/view/111/kolichestvo-atak-na-tsep-postavok-rastet-kto-pod-pritselom-i-kak-protivostoyat.
8. Cyber Security Threats. URL : https://www.imperva.com/learn/application-security/cyber-security-threats/.