Project on supply chain risk analysis

Assignment Help Computer Network Security
Reference no: EM132568797 , Length: 8 pages

CSIA 350 Cybersecurity in Business & Industry - University of Maryland Global Campus

Project: Supply Chain Risk Analysis

For this project, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry.To begin, you will need to explore through the readings the concepts of global supply chains and global cooperation for cross-border trade in goods and services. Then, you will need to investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

2. Read the following articles / documents which focus on international cooperation and capacity building for cybersecurity:

3. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

4. Research best practices and recommended strategies and approaches for managing global supply chain risk
a. Best Practices in Cyber Security Supply Chain Risk Management
b. Supply Chain Cybersecurity: Experts on How to Mitigate Third Party Risk
c. 5 Cybersecurity Best Practices for your Supply Chain Ecosystem

Write

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity related risks in global supply chains for products and services. Your introduction should include a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

2. A supply chain riskssection in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.

3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.This section should include discussion of political, economic, and social factors which impact management of supply chain risk.

4. A best practicessection in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Attachment:- Supply Chain Risk Analysis.rar

Reference no: EM132568797

Questions Cloud

How to estimate the change in the company operating income : Using the CM ratio, calculate the break-even level of sales? Estimate the change in the company's operating income if it increased its total sales by $20,000.
Discuss the background of western culture : Western Society Explain in detail what is meant by "western society/culture?
Discuss four types of situational leadership styles : Discuss the four types of situational leadership styles proposed by Hersey and Blanchard.
How much is Turnbull Manufacturing total cost : Beginning work in process inventory $35,000. How much is Turnbull Manufacturing's total cost of work in process for the year
Project on supply chain risk analysis : CSIA 350: Cybersecurity in Business and Industry - research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry
Justify the timeline for your program evaluation : To complete this additional section of the Course Project: Create a Gantt or PERT Chart, and narrative paragraphs that: Justify the timeline for your program.
How many training classes should the company hold each year : Viewing new drivers, How many training classes should the company hold each year? What is the total annual cost of your recommendation?
Identify a problem or issue related to practice : Identify a problem or issue related to practice, policy, population, or education that aligns with the organizational
Compute the net cash provided by investing activities : Dividends paid to preferred stockholders? $500,000. Compute the net cash provided (used) by investing activities during 2018

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd