2021
DOI: 10.3390/electronics10101168
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports

Abstract: Cybersecurity is a concern for organizations in this era. However, strengthening the security of an organization’s internal network may not be sufficient since modern organizations depend on third parties, and these dependencies may open new attack paths to cybercriminals. Cyber Third-Party Risk Management (C-TPRM) is a relatively new concept in the business world. All vendors or partners possess a potential security vulnerability and threat. Even if an organization has the best cybersecurity practice, its dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…The impact of cyberattacks on SC goes beyond the organization and may transfer to cities and countries, as it happened in China, or even to the complete continent. From a managerial standpoint, another important concept that emerges in this study is Cyber Third-Party Risk Management, which sheds light on the fact that risks for the organizations can come from inside the company and also from a third party, supplier or customer (Keskin et al, 2021).…”
Section: Discussionmentioning
confidence: 99%
“…The impact of cyberattacks on SC goes beyond the organization and may transfer to cities and countries, as it happened in China, or even to the complete continent. From a managerial standpoint, another important concept that emerges in this study is Cyber Third-Party Risk Management, which sheds light on the fact that risks for the organizations can come from inside the company and also from a third party, supplier or customer (Keskin et al, 2021).…”
Section: Discussionmentioning
confidence: 99%
“…Malware [33] Web Application Attacks [26][44] Supply Chain Attacks [53] Third-party and vendor risks [53] Zero-day Vulnerabilities [50] Social Engineering This dimension encompasses threats that Phishing [30] and Deceptive Threats Dimension rely on manipulation and deceit, often involving the impersonation of legitimate entities or processes Deepfakes and Disinformation [51] Account Takeover Threats [87] Disruptive Threats Dimension Threats within this dimension are designed to interrupt services and infrastructure, often causing significant operational impact Distributed Denial of Service [30] Cryptojacking [50]…”
Section: Advancedmentioning
confidence: 99%
“…Third-Party Risk Management [53] Banks must assess the security posture of thirdparty vendors and partners, ensuring that they adhere to the same security standards to prevent potential supply chain attacks.…”
Section: Regular Audits and Penetrationmentioning
confidence: 99%
“…Regarding third-Party dependencies, civil registration systems may rely on third-party vendors or service providers for certain functionalities or infrastructure [177]. Managing the security of these external dependencies can be challenging since organizations have limited control over the security practices of third parties [178]- [180]. It is essential to conduct thorough vendor assessments and establish clear contractual agreements to ensure the security and privacy [181] of the system.…”
Section: Issues With Current Countermeasures Against Security Breache...mentioning
confidence: 99%