More Subjects
[Name of the Writer]
[Name of Instructor]
[Subject]
[Date]
Client and Application Security
A supply chain attack is a type of cyber-attack in which hackers attack and damage the vulnerable elements in the supply chain (Urciuoli). Typically, a supply chain is a collection of different organizations that join their businesses and have the same goals and objectives. The attackers exploit the supply chain elements to damage the whole network. Supply chain attacks can be caused by a compromised software update and pre-installed malicious software on devices such as USB and camera, etc. Several organizations have fallen prey to this attack. On 4th April 2019, a company named Wipro also faced a supply chain attack.
Wipro is a company that is considered as one of the largest IT outsourcing companies. The hackers targeted the company by sending phishing emails to several employees of the companies. When the emails were opened the whole company’s network was corrupted immediately. The workers after noticing a suspicious email activity reported the issue to the IT team. However, the IT team was not able to recover the systems so they immediately shut down the whole network. It took days to resolve the issue. According to several reports, approximately eleven other companies were hit by this attack. As the company’s clients were high profile, that is, from aerospace, banking sector, and defense authorities the company faced loss. The shares of the company fell down and the reputation was damaged. Several resources claim that the attack was sponsored by the state yet even after extensive investigation, the real culprits were not identified. However, after lots of efforts, the company has recovered from the attack successfully CITATION OFl19 \l 1033 (O'Flaherty).
Several techniques can be used to protect an organization from a supply chain attack. The first and foremost important thing is to build a file wall and integrity policy that allows the use of only authorized files and applications. Companies should develop an endpoint detection system. This help in detecting any cyber-attack or suspicious activity. Also, organizations must regularly update their security infrastructure to avoid any king of cyber-attack.
Works Cited
BIBLIOGRAPHY O'Flaherty, Kate. Breaking Down The Wipro Breach -- And What It Means For Supply Chain Security. 16 04 2019. ©2019 Forbes Media LLC. <https://www.forbes.com/sites/kateoflahertyuk/2019/04/16/breaking-down-the-wipro-breach-and-what-it-means-for-supply-chain-security/#24f1eb245259>.
Urciuoli, Luca, et al. "Supply chain cyber security–potential threats." Information & Security: An International Journal 29.1 (2013).
More Subjects
Join our mailing list
© All Rights Reserved 2024