International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 73 | Issue 6 | Year 2025 | Article Id. IJCTT-V73I6P105 | DOI : https://doi.org/10.14445/22312803/IJCTT-V73I6P105

Understanding Cybersecurity Risks in Supply Chain Management


Rajender Pell Reddy

Received Revised Accepted Published
26 Apr 2025 30 May 2025 14 Jun 2025 28 Jun 2025

Citation :

Rajender Pell Reddy, "Understanding Cybersecurity Risks in Supply Chain Management," International Journal of Computer Trends and Technology (IJCTT), vol. 73, no. 6, pp. 34-41, 2025. Crossref, https://doi.org/10.14445/22312803/IJCTT-V73I6P105

Abstract

This document globalization has put SCM at high cybersecurity risk, undermining information operations and security. The present paper explores various facets of cybersecurity risks associated with SCM, such as the issues related to the supplier’s network, lack of strong encryption policies, and the surge of hi-tech cyber threats. We review academic literature, present methodologies of risk identification risk management measures and focus on examples of SC attacks that demonstrate supply chain risk impacts in actual scenarios. A suggested causal analysis plan covers cybersecurity threats and utilizes the application of technological tools like the blockchain, machine learning, and zero-trust architecture. Last of all, we touch on the need to promote the culture of cybersecurity for all actors involved.

Keywords

Supply Chain Management, Cybersecurity, Blockchain, Zero-Trust, Cyber Threats.

References

[1]     Sara Saberi et al., “Blockchain Technology and Its Relationships to Sustainable Supply Chain Management,” International Journal of Production Research, vol. 57, no. 7, pp. 2117-2135, 2019.
[CrossRef] [
Google Scholar] [Publisher Link]

[2]     Shipra Pandey et al., “Cyber Security Risks in Globalized Supply Chains: Conceptual Framework,” Journal of Global Operations and Strategic Sourcing, vol. 13, no. 1, pp. 103-128, 2020.
[CrossRef] [
Google Scholar] [Publisher Link]

[3]     Claudia Colicchia, Alessandro Creazza, and David A. Menachof, “Managing Cyber and Information Risks in Supply Chains: Insights from an Exploratory Analysis,” Supply Chain Management: An International Journal, vol. 24, no. 2, pp. 215-240, 2019.
[CrossRef] [
Google Scholar] [Publisher Link]

[4]     Mari Aarland, “Cybersecurity in Digital Supply Chains in the Procurement Process: Introducing the Digital Supply Chain Management Framework,” Information & Computer Security, vol. 33, no. 1, pp. 5-24, 2024.
[CrossRef] [
Google Scholar] [Publisher Link]

[5]     Jason Deane, Wade Baker, and Loren Rees, “Cybersecurity in Supply Chains: Quantifying Risk,” Journal of Computer Information Systems, vol. 63, no. 3, pp. 507-521, 2023.
[CrossRef] [
Google Scholar] [Publisher Link]

[6]     Federico Del Giorgio Solfa, “Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry,” International Journal of Technology, Innovation and Management, vol. 2, no. 2, pp. 18-32, 2022.
[CrossRef] [
Google Scholar] [Publisher Link]

[7]     Zhang Wei, and Wu Xiang, “The Importance of Supply Chain Management,” International Journal of Business and Social Science, vol. 4, no. 16, pp. 279-282, 2013.
 [
Google Scholar] [Publisher Link]

[8]     Steven A. Melnyk et al., “New Challenges in Supply Chain Management: Cybersecurity across the Supply Chain,” International Journal of Production Research, vol. 60, no. 1, pp. 162-183, 2022.
[CrossRef] [
Google Scholar] [Publisher Link]

[9]     Theresa Sobb, Benjamin Turnbull, and Nour Moustafa, “Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions,” Electronics, vol. 9, no. 11, pp. 1-31, 2020.
[CrossRef] [
Google Scholar] [Publisher Link]

[10]  Oluwabunmi Layode et al., “Addressing Cybersecurity Challenges in Sustainable Supply Chain Management: A Review of Current Practices and Future Directions,” International Journal of Management & Entrepreneurship Research, vol. 6, no. 6, pp. 1954-1981, 2024.
[CrossRef] [
Google Scholar] [Publisher Link]

[11]  Om Pal, and Vandana Srivastava, and Bashir Alam, “Cyber Security Risks and Challenges in Supply Chain,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5, pp. 662-666, 2017.
[CrossRef] [
Google Scholar] [Publisher Link]

[12]  Naeem Firdous Syed et al., “Traceability in Supply Chains: A Cyber Security Analysis,” Computers & Security, vol. 112, 2022.
[CrossRef] [
Google Scholar] [Publisher Link]

[13]  Luca Urciuoli et al., “Supply Chain Cyber Security–Potential Threats,” Information & Security: An International Journal, vol. 29, no. 1, pp. 51-68, 2013.
[CrossRef] [
Google Scholar] [Publisher Link]

[14]  Isaac Daniel Sánchez-García, Jezreel Mejía, and Tomás San Feliu Gilabert, “Cybersecurity Risk Assessment: A Systematic Mapping Review, Proposal, and Validation,” Applied Sciences, vol. 13, no. 1, pp. 1-29, 2023.
[CrossRef] [
Google Scholar] [Publisher Link]

[15]  Andrew Fielder et al., “Risk Assessment Uncertainties in Cybersecurity Investments,” Games, vol. 9, no. 2, pp. 1-14, 2018.
[CrossRef] [
Google Scholar] [Publisher Link]

[16]  Valentina Petrova, “A Cybersecurity Risk Assessment,” International Scientific Journal “Industry 4.0”, vol. 6, no. 1, pp. 37-40, 2021.
 [
Google Scholar] [Publisher Link]

[17]  Yuanhang He et al., “A Survey on Zero Trust Architecture: Challenges and Future Trends,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, pp. 1-13, 2022.
[CrossRef] [
Google Scholar] [Publisher Link]

[18]  Nishant Kumar et al., “Blockchain Adoption for Data Integrity in Higher Education E-Learning,” International Conference on Data Analytics for Business and Industry, Sakheer, Bahrain, pp. 1-6, 2021.
[CrossRef] [
Google Scholar] [Publisher Link]

[19]  Avijit Roy, Anik Dhar, and Sejuti Sarker Tinny, “Strengthening IoT Cybersecurity with Zero Trust Architecture: A Comprehensive Review,” Journal of Computer Science and Information Technology, vol. 1, no. 1, pp. 25-50, 2024.
[CrossRef] [
Google Scholar] [Publisher Link]

[20]  Vinden Wylde et al., “Cybersecurity, Data Privacy and Blockchain: A Review,” SN Computer Science, vol. 3, no. 2, pp. 1-12, 2022.
[CrossRef] [
Google Scholar] [Publisher Link]