Call for Papers
Quick Links
January, 2025 | Volume 04 | Issue 01
Building Back Stronger: A Strategic Model for Post-Supply Chain Attack Management
Shatakshi Singh
Research Scholar, National PG College, Lucknow, U.P., India
Author
Shruti Trivedi
Research Scholar, National PG College, Lucknow, U.P., India
Author
Rinku Raheja
Assistant Professor, National PG College, Lucknow, U.P., India
Author
📌 DOI: https://doi.org/10.63920/tjths.41001
🔑 Keywords: Supply Chain Attack; Recovery Model; Supply Chain Cases; Third Party
đź“… Publication Date: 04 January 2025
📜 License:
This work is licensed under a Creative Commons Attribution 4.0 International License
- Share — Copy and Redistribute the material
- Adapt — Remix, Transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Abstract:
In today's fast-paced, interconnected world, supply chains are essential to the smooth operation of any business. Yet, with this increased connectivity comes a hidden risk: vulnerabilities that cybercriminals are all too eager to exploit. Supply chain attacks, where attackers target the very systems and networks that companies rely on, have become more common, leading to disruptions, loss of sensitive data, and significant financial strain. These attacks are not only growing in frequency, but they are also becoming increasingly sophisticated, making it clear that prevention alone is no longer enough. Companies need a plan for what comes next – a way to recover quickly and learn from the experience. This paper delves into the growing threat of supply chain attacks and introduces a post-recovery model designed to help businesses manage the aftermath. By focusing on rapid recovery, strengthening security, and fostering long-term resilience, this model enables businesses to recover effectively and emerge more prepared for future challenges. In a world where things can change in an instant, it’s not just about preventing an attack – it’s about knowing how to recover and emerge even stronger when the unexpected happens.
Download Full PDF Paper
References
[1]. Kratikal, “Why Supply chain attacks are the biggest threat to business”, Kratikal.
https://kratikal.com/blog/why-supply-chain-attacks-are-the-biggest-threat-to-businesses/
[2]. CyberCrime Magazine, “Software Supply Chain Attacks to Cost the world $60 billion by
2025”, Steve Morgan, Oct 3,2023. https://cybersecurityventures.com/software-supply
chain-attacks-to-cost-the-world-60-billion
by25/#:~:text=Gartner%20predicts%20that%20by%202025,Guy%20Podjarny%2C%20f
ounder%20of%20Snyk
[3]. BlackBerry Blog, “The State of Software Supply Chain Security[Research]”, Bruce
Sussman, Aug 6, 2024. https://blogs.blackberry.com/en/2024/06/supply-chain
cybersecurity-survey
research#:~:text=Recovery%20After%20an%20Attack,of%20Product%20Security%20a
t%20BlackBerry
[4]. SupplyChain Digital, “Think Rebuild not recovery after a Supply Chain Attack”, Tom
Chapman, Oct 20, 2024. https://supplychaindigital.com/technology/immersive-labs-on
supply-chain-cyber-attacks
[5]. Zscaler, “What is the SolarWinds Cyberattack?”, Zscaler.
https://www.zscaler.com/resources/security-terms-glossary/what-is-the-solarwinds
cyberattack
[6]. Fortinet, “Solar Winds Cyber Attack”, Fortinet.
https://www.fortinet.com/resources/cyberglossary/solarwinds-cyber-attack
[7]. TechTarget, “SolarWinds hack explained: Everything you need to know”, Saheed
Oladimeji, Sean Michael Kerner,Nov 03,
2023.https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained
Everything-you-need-to-know
[8]. CSO, “SolarWinds attack explained: And why it was so hard to detect”, Lucian
Constantin, Dec 15, 2020.https://www.csoonline.com/article/570191/solarwinds-supply
chain-attack-explained-why-organizations-were-not-prepared.html
[9]. Kaspersky, “Operation ShadowHammer: new supply chain attack threatens hundreds of
thousands of users worldwide”, March 26, 2019, Kaspersky.
https://www.kaspersky.com/about/press-releases/operation-shadowhammer-new-supply
chain-attack
[10]. Shalini Lamba, Jatin Awasthi and Vikas Yadav, Beyond Cryptocurrency: Harnessing
Blockchain for Cybersecurity, TEJAS Journal of Technologies and Humanitarian Science
ISSN-2583-5599 Vol.03, I.02 (2024)
