TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Quarterly | Peer Reviewed Journal

January, 2025 | Volume 04 | Issue 01

Building Back Stronger: A Strategic Model for Post-Supply Chain Attack Management


Shatakshi Singh
Research Scholar, National PG College, Lucknow, U.P., India

Author

Shruti Trivedi
Research Scholar, National PG College, Lucknow, U.P., India

Author

Rinku Raheja
Assistant Professor, National PG College, Lucknow, U.P., India

Author


📌 DOI: https://doi.org/10.63920/tjths.41001

🔑 Keywords: Supply Chain Attack; Recovery Model; Supply Chain Cases; Third Party

đź“… Publication Date: 04 January 2025

📜 License:

  • Share — Copy and Redistribute the material
  • Adapt — Remix, Transform, and build upon the material
  • The licensor cannot revoke these freedoms as long as you follow the license terms.

Abstract:

In today's fast-paced, interconnected world, supply chains are essential to the smooth operation of any business. Yet, with this increased connectivity comes a hidden risk: vulnerabilities that cybercriminals are all too eager to exploit. Supply chain attacks, where attackers target the very systems and networks that companies rely on, have become more common, leading to disruptions, loss of sensitive data, and significant financial strain. These attacks are not only growing in frequency, but they are also becoming increasingly sophisticated, making it clear that prevention alone is no longer enough. Companies need a plan for what comes next – a way to recover quickly and learn from the experience. This paper delves into the growing threat of supply chain attacks and introduces a post-recovery model designed to help businesses manage the aftermath. By focusing on rapid recovery, strengthening security, and fostering long-term resilience, this model enables businesses to recover effectively and emerge more prepared for future challenges. In a world where things can change in an instant, it’s not just about preventing an attack – it’s about knowing how to recover and emerge even stronger when the unexpected happens.

Download Full PDF Paper


References

[1]. Kratikal, “Why Supply chain attacks are the biggest threat to business”, Kratikal. https://kratikal.com/blog/why-supply-chain-attacks-are-the-biggest-threat-to-businesses/
[2]. CyberCrime Magazine, “Software Supply Chain Attacks to Cost the world $60 billion by 2025”, Steve Morgan, Oct 3,2023. https://cybersecurityventures.com/software-supply chain-attacks-to-cost-the-world-60-billion by25/#:~:text=Gartner%20predicts%20that%20by%202025,Guy%20Podjarny%2C%20f ounder%20of%20Snyk
[3]. BlackBerry Blog, “The State of Software Supply Chain Security[Research]”, Bruce Sussman, Aug 6, 2024. https://blogs.blackberry.com/en/2024/06/supply-chain cybersecurity-survey research#:~:text=Recovery%20After%20an%20Attack,of%20Product%20Security%20a t%20BlackBerry
[4]. SupplyChain Digital, “Think Rebuild not recovery after a Supply Chain Attack”, Tom Chapman, Oct 20, 2024. https://supplychaindigital.com/technology/immersive-labs-on supply-chain-cyber-attacks
[5]. Zscaler, “What is the SolarWinds Cyberattack?”, Zscaler. https://www.zscaler.com/resources/security-terms-glossary/what-is-the-solarwinds cyberattack
[6]. Fortinet, “Solar Winds Cyber Attack”, Fortinet. https://www.fortinet.com/resources/cyberglossary/solarwinds-cyber-attack
[7]. TechTarget, “SolarWinds hack explained: Everything you need to know”, Saheed Oladimeji, Sean Michael Kerner,Nov 03, 2023.https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained Everything-you-need-to-know
[8]. CSO, “SolarWinds attack explained: And why it was so hard to detect”, Lucian Constantin, Dec 15, 2020.https://www.csoonline.com/article/570191/solarwinds-supply chain-attack-explained-why-organizations-were-not-prepared.html
[9]. Kaspersky, “Operation ShadowHammer: new supply chain attack threatens hundreds of thousands of users worldwide”, March 26, 2019, Kaspersky. https://www.kaspersky.com/about/press-releases/operation-shadowhammer-new-supply chain-attack
[10]. Shalini Lamba, Jatin Awasthi and Vikas Yadav, Beyond Cryptocurrency: Harnessing Blockchain for Cybersecurity, TEJAS Journal of Technologies and Humanitarian Science ISSN-2583-5599 Vol.03, I.02 (2024)