The Effects of Cyber Supply Chain Attacks and Mitigation Strategies

The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering. In today’s world, Threat Variants are becoming more complex, more covert, and stealthier. Thus, it makes it almost impossible to detect them on time before the actual damage is done.

One such example of this is what is known as Supply Chain Attacks. What makes this different from the other Threat Variants is that through just one point of entry, the Cyberattacker can deploy a Malicious Payload and impact thousands of victims. This is what this book is about, and it covers the following:

  • Important Cybersecurity Concepts
  • An introduction to Supply Chain Attacks and its impact on the Critical Infrastructure in the United States
  • Examples of Supply Chain Attacks, most notably those of Solar Winds and Crowd Strike. Mitigation strategies that the CISO and their IT Security team can take to thwart off Supply Chain Attacks
1147002460
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies

The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering. In today’s world, Threat Variants are becoming more complex, more covert, and stealthier. Thus, it makes it almost impossible to detect them on time before the actual damage is done.

One such example of this is what is known as Supply Chain Attacks. What makes this different from the other Threat Variants is that through just one point of entry, the Cyberattacker can deploy a Malicious Payload and impact thousands of victims. This is what this book is about, and it covers the following:

  • Important Cybersecurity Concepts
  • An introduction to Supply Chain Attacks and its impact on the Critical Infrastructure in the United States
  • Examples of Supply Chain Attacks, most notably those of Solar Winds and Crowd Strike. Mitigation strategies that the CISO and their IT Security team can take to thwart off Supply Chain Attacks
64.99 In Stock
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies

The Effects of Cyber Supply Chain Attacks and Mitigation Strategies

by Ravi Das
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies

The Effects of Cyber Supply Chain Attacks and Mitigation Strategies

by Ravi Das

Hardcover

$64.99 
  • SHIP THIS ITEM
    In stock. Ships in 2-4 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering. In today’s world, Threat Variants are becoming more complex, more covert, and stealthier. Thus, it makes it almost impossible to detect them on time before the actual damage is done.

One such example of this is what is known as Supply Chain Attacks. What makes this different from the other Threat Variants is that through just one point of entry, the Cyberattacker can deploy a Malicious Payload and impact thousands of victims. This is what this book is about, and it covers the following:

  • Important Cybersecurity Concepts
  • An introduction to Supply Chain Attacks and its impact on the Critical Infrastructure in the United States
  • Examples of Supply Chain Attacks, most notably those of Solar Winds and Crowd Strike. Mitigation strategies that the CISO and their IT Security team can take to thwart off Supply Chain Attacks

Product Details

ISBN-13: 9781032955315
Publisher: CRC Press
Publication date: 06/29/2025
Pages: 134
Product dimensions: 6.12(w) x 9.19(h) x (d)

About the Author

I am currently a Cyber Technical Engineering Writer for a large IT Services Provider. I also do Cybersecurity Consulting through my private practice, ML Tech, Inc. I also hold the Certified In Cybersecurity Certification from the ISC(2).

I have published 18 books through CRC Press. I have recently signed a contract for a 19th book manuscript.

Table of Contents

Chapter 1:  An Overview Into Cybersecurity Chapter 2:  An Overview of Supply Chain Attacks & Critical Infrastructure Chapter 3:  Real World Supply Chain Attacks Chapter 4:  How To Mitigate The Risks of Supply Chain Attacks

From the B&N Reads Blog

Customer Reviews