CYBER SECURITY IN SUPPLY CHAIN MANAGEMENT (SCM)

Olena GALUSHKO, Tetyana SELIVYORSTOVA

GALUSHKO O., SELIVYORSTOVA T. (2022), CYBER SECURITY IN SUPPLY CHAIN MANAGEMENT (SCM); Scientific Bulletin of Dnipropetrovsk State University of Internal Affair, Special Issue №2, 537-542

DOI: 10.31733/2078-3566-2022-6-537-542

 

ABSTRACT. Cyber security in supply chain management (SCM) is becoming increasingly relevant as today’s companies increasingly use information technology and digital systems. And the supply chains themselves are becoming more and more complex and include more and more participants. With so many points of interaction and third-party suppliers and buyers, it can be difficult to monitor whether all parties are following proper cybersecurity protocols. Therefore, in today’s business environment, cyber security is becoming an integral part of supply chain management. This involves a thorough analysis of potential risks created by external suppliers, buyers and other market participants, logistics and transportation, with further preventive measures to reduce them. Any supply chain is only as strong as its weakest link. Therefore, cyber security measures are mainly aimed at identifying vulnerabilities and eliminating cyber threats in the weakest links of the supply chain.

The article deals with the essence of supply chain management and analyzes the role of cyber security in the management system. It is noted, that in modern conditions, cyber security is becoming an element of supply chain management. The main types of risks and cyber threats in supply chains are analyzed, in particular the issue of security of third-party suppliers. Measures to eliminate cyber risks and to increase cyber security in supply chain management are proposed. By taking a proactive approach and implementing strong cybersecurity measures, companies can reduce the risk of cyberattacks and ensure the security of their supply chain.

Keywords: supply chains, cyber security, information flows, counterparties, cyber threats.

    References:

  1. Baranov, O. A. (2014). Pro tlumachennya ta vyznachennya ponyattya “kiberbezpeka” [On the interpretation and definition of the concept of “cyber security”]. Pravova Infarmatyka. № 2 (42), pp. 54- 62. [in Ukr.].
  2. Cyber Security Breaches Survey (2022). URL : https://www.gov.uk/ government/statistics/cyber-security-breaches-survey-2022/cyber-security-breaches-survey-2022.
  3. Furashev, V. M. (2012). Kiberprostir ta informatsiynyy prostir, kiberbezpeka ta informatsiyna bezpeka: sutnist’, vyznachennya, vidminnosti [Cyberspace and information space, cyber security and information security: essence, definition, differences]. Informatyka i pravo. No. 2. P. 162-169. URL : http://ippi.org.ua/sites/default/files/12fvmsvv.pdf. [in Ukr.].
  4. Dubov, D. V., Ozhevan, M. A. (2011). Kiberbezpeka : svitovi tendentsiyi ta vyklyky dlya Ukrayiny [Cyber security: global trends and challenges for Ukraine]. Kyiv : NISD. 30 p. [in Ukr.].
  5. Potii, O. V. et al. (2021). Kontseptual’ni zasady vprovadzhennya orhanizatsiyno-tekhnichnoyi modeli kiberzakhystu Ukrayiny [Conceptual principles of the implementation of the organizational and technical model of cyber protection of Ukraine]. Zakhyst informatsiyi. № 23 (1), pp. 47-60. [in Ukr.].
  6. Mentzer, J. T., DeWitt, W., Keebler, J. S., Min, S., Nix, N. W., Smith, C. D. & Zacharia, Z. G. (2001). Defining supply chain management. Journal of Business logistics. No 22 (2), pp. 1-25.
  7. Kil’kist’ atak na lantsyuh postachannya zrostaye: khto pid prytsilom ta yak protystoyaty [Supply chain attacks are on the rise : who’s being targeted and how to fight back]. ESET. 2021. URL : https://eset.ua/ua/blog/view/111/kolichestvo-atak-na-tsep-postavok-rastet-kto-pod-pritselom-i-kak protivostoyat. [in Ukr.].
  8. Cyber Security Threats. URL : https://www.imperva.com/learn/application-security/cyber security-threats/.