Systems-based cyber security in the supply chain

Scott W. Barron, Y. Cho, Andrew Hua, W. Norcross, Jack Voigt, Y. Haimes
{"title":"Systems-based cyber security in the supply chain","authors":"Scott W. Barron, Y. Cho, Andrew Hua, W. Norcross, Jack Voigt, Y. Haimes","doi":"10.1109/SIEDS.2016.7489299","DOIUrl":null,"url":null,"abstract":"The importance of the many sources of risk to the supply chain has been recognized by the practitioners and leadership in this sector of the economy. Cyber security is paramount to the success of the supply chain sector, which constitutes a safety-critical system for the U.S. and global economy. The diverse consequences from a malevolent attack could adversely affect inventory, product quality, time of delivery and the multiple sequential chain-effects due to these interdependent and interconnected economies. As a team, we leveraged the knowledge that we have accrued throughout our academic career with the knowledge and experience of our Technical Advisor, Yacov Haimes. The vast research opportunities at the University of Virginia and the seminal contributions to the field of systems of systems risk analysis further enhanced this comprehensive report. Building on our research and on Hierarchical Holographic Modeling, we performed risk assessment and management. Furthermore, as a team, we developed an overview of this complex system of systems, and generated multiple scenarios of malevolent penetration to the supply chain. Then through the use of Risk Filtering and Risk Management we reduced the large number of risk scenarios to a small set of critical scenarios. To apply our modeling and analytical skills to an emergent \"risk\" we examined the impact of malevolent use of the three-dimensional (3D) printers might pose to the integrity of the supply chain and the possibilities of this revolutionary technology as a malevolent medium to decimate the safety-critical supply chain systems of systems. In sum, through the use of modeling and analyzing supply chains as complex systems of systems, and by identifying shared-states, resources, decisions, and other variables among the subsystems of the supply chain, we have been able to identify and isolate safety critical features of the supply chain.","PeriodicalId":426864,"journal":{"name":"2016 IEEE Systems and Information Engineering Design Symposium (SIEDS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Systems and Information Engineering Design Symposium (SIEDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIEDS.2016.7489299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

The importance of the many sources of risk to the supply chain has been recognized by the practitioners and leadership in this sector of the economy. Cyber security is paramount to the success of the supply chain sector, which constitutes a safety-critical system for the U.S. and global economy. The diverse consequences from a malevolent attack could adversely affect inventory, product quality, time of delivery and the multiple sequential chain-effects due to these interdependent and interconnected economies. As a team, we leveraged the knowledge that we have accrued throughout our academic career with the knowledge and experience of our Technical Advisor, Yacov Haimes. The vast research opportunities at the University of Virginia and the seminal contributions to the field of systems of systems risk analysis further enhanced this comprehensive report. Building on our research and on Hierarchical Holographic Modeling, we performed risk assessment and management. Furthermore, as a team, we developed an overview of this complex system of systems, and generated multiple scenarios of malevolent penetration to the supply chain. Then through the use of Risk Filtering and Risk Management we reduced the large number of risk scenarios to a small set of critical scenarios. To apply our modeling and analytical skills to an emergent "risk" we examined the impact of malevolent use of the three-dimensional (3D) printers might pose to the integrity of the supply chain and the possibilities of this revolutionary technology as a malevolent medium to decimate the safety-critical supply chain systems of systems. In sum, through the use of modeling and analyzing supply chains as complex systems of systems, and by identifying shared-states, resources, decisions, and other variables among the subsystems of the supply chain, we have been able to identify and isolate safety critical features of the supply chain.
基于系统的供应链网络安全
供应链的许多风险来源的重要性已经被这个经济部门的从业者和领导层认识到。网络安全对于构成美国和全球经济安全关键系统的供应链部门的成功至关重要。恶意攻击的各种后果可能会对库存、产品质量、交货时间以及由于这些相互依存和相互关联的经济而产生的多重连续连锁效应产生不利影响。作为一个团队,我们利用我们在整个学术生涯中积累的知识和我们的技术顾问Yacov Haimes的知识和经验。弗吉尼亚大学的大量研究机会和对系统风险分析系统领域的开创性贡献进一步增强了这份综合报告。在我们的研究和层次全息建模的基础上,我们进行了风险评估和管理。此外,作为一个团队,我们开发了这个复杂系统的概述,并生成了恶意渗透到供应链的多个场景。然后,通过使用风险过滤和风险管理,我们将大量的风险场景减少到一小部分关键场景。为了将我们的建模和分析技能应用于紧急“风险”,我们研究了恶意使用三维(3D)打印机可能对供应链完整性造成的影响,以及这种革命性技术作为恶意媒介摧毁安全关键供应链系统的可能性。总之,通过使用建模和分析供应链作为系统的复杂系统,并通过识别供应链子系统之间的共享状态、资源、决策和其他变量,我们已经能够识别和隔离供应链的安全关键特征。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信