网络供应链攻击的影响及缓解策略(1).pdfVIP

  • 0
  • 0
  • 约27.77万字
  • 发布于广东
  • 举报
  • 文档已下架,其它文档更精彩

网络供应链攻击的影响及缓解策略(1).pdf

TheEffectsofCyberSupplyChain

AttacksandMitigationStrategies

TheworldofCybersecuritytodayisbecomingincreasinglycomplex.There

aremanynewThreatVariantsthatarecomingout,butmanyofthemare

justtweakedversionsofsomeoftheoldestones,suchasPhishingand

SocialEngineering.Intoday’sworld,ThreatVariantsarebecomingmuch

complex,stealthier,andcovert.Thus,itmakesitalmostimpossibleto

detectthemontimebeforetheactualdamageisdone.

OnesuchexampleofthisarewhatisknownasSupplyChainAttacks.

WhatmakesthisdifferentfromtheotherThreatVariantsisthatthroughjust

onepointofentry,theCyberattackercandeployaMaliciousPayloadand

impactthousandsofvictims.Thisiswhatthisbookisabout,anditcovers

thefollowing:

ImportantCybersecurityConcepts

AintroductiontoSupplyChainAttacksanditsimpactontheCritical

InfrastructureintheUnitedStates.

ExamplesofSupplyChainAttacks,mostnotablythoseofSolarWinds

andCrowdStrike.

MitigationstrategiesthattheCISOandtheirITSecurityteamcantake

tothwartoffSupplyChainAttacks.

TheEffectsofCyberSupplyChain

AttacksandMitigationStrategies

RaviDas

Designedcoverimage:ShutterstockImageID2176617569

Firsteditionpublished2026

byCRCPress

2385NWExecutiveCenterDrive,Suite320,BocaRatonFL33431

andbyCRCPress

4ParkSquare,MiltonPark,Abingdon,Oxon,OX144RN

CRCPressisanimprintofTaylorFrancisGroup,LLC

©2026RaviDas

Reasonableeffortshavebeenmadetopublishreliabledataandinformation,buttheauthorand

publishercannotassumeresponsibilityforthevalidityofallmaterialsortheconsequencesoftheir

use.Theauthorsandpublishershaveattemptedtotracethecopyrightholdersofallmaterial

reproducedinthispublicationandapologizetocopyrightholdersifpermissiontopublishinthis

文档评论(0)

1亿VIP精品文档

相关文档