Research Article | Open Access | Download PDF
Volume 73 | Issue 6 | Year 2025 | Article Id. IJCTT-V73I6P105 | DOI : https://doi.org/10.14445/22312803/IJCTT-V73I6P105
Understanding Cybersecurity Risks in Supply Chain Management
Rajender Pell Reddy
Received | Revised | Accepted | Published |
---|---|---|---|
26 Apr 2025 | 30 May 2025 | 14 Jun 2025 | 28 Jun 2025 |
Citation :
Rajender Pell Reddy, "Understanding Cybersecurity Risks in Supply Chain Management," International Journal of Computer Trends and Technology (IJCTT), vol. 73, no. 6, pp. 34-41, 2025. Crossref, https://doi.org/10.14445/22312803/IJCTT-V73I6P105
Abstract
This document globalization has put SCM at high cybersecurity risk, undermining information operations and security. The present paper explores various facets of cybersecurity risks associated with SCM, such as the issues related to the supplier’s network, lack of strong encryption policies, and the surge of hi-tech cyber threats. We review academic literature, present methodologies of risk identification risk management measures and focus on examples of SC attacks that demonstrate supply chain risk impacts in actual scenarios. A suggested causal analysis plan covers cybersecurity threats and utilizes the application of technological tools like the blockchain, machine learning, and zero-trust architecture. Last of all, we touch on the need to promote the culture of cybersecurity for all actors involved.
Keywords
Supply Chain Management, Cybersecurity, Blockchain, Zero-Trust, Cyber Threats.References
[1]
Sara Saberi et al., “Blockchain Technology and Its Relationships
to Sustainable Supply Chain Management,” International
Journal of Production Research, vol. 57, no. 7, pp. 2117-2135, 2019.
[CrossRef]
[Google Scholar] [Publisher Link]
[2]
Shipra Pandey et al., “Cyber Security Risks in Globalized
Supply Chains: Conceptual Framework,” Journal
of Global Operations and Strategic Sourcing, vol. 13, no. 1, pp. 103-128,
2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3]
Claudia Colicchia, Alessandro Creazza, and David A. Menachof,
“Managing Cyber and Information Risks in Supply Chains: Insights from an
Exploratory Analysis,” Supply Chain
Management: An International Journal, vol. 24, no. 2, pp. 215-240, 2019.
[CrossRef]
[Google Scholar] [Publisher Link]
[4]
Mari Aarland, “Cybersecurity in Digital Supply Chains in the
Procurement Process: Introducing the Digital Supply Chain Management
Framework,” Information & Computer
Security, vol. 33, no. 1, pp. 5-24, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5]
Jason Deane, Wade Baker, and Loren Rees, “Cybersecurity in
Supply Chains: Quantifying Risk,” Journal
of Computer Information Systems, vol. 63, no. 3, pp. 507-521, 2023.
[CrossRef]
[Google Scholar] [Publisher Link]
[6]
Federico Del Giorgio Solfa, “Impacts of Cyber Security and
Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical
Industry,” International Journal of
Technology, Innovation and Management, vol. 2, no. 2, pp. 18-32, 2022.
[CrossRef]
[Google Scholar] [Publisher Link]
[7]
Zhang Wei, and Wu Xiang, “The Importance of Supply Chain
Management,” International Journal of
Business and Social Science, vol. 4, no. 16, pp. 279-282, 2013.
[Google Scholar] [Publisher
Link]
[8]
Steven A. Melnyk et al., “New Challenges in Supply Chain
Management: Cybersecurity across the Supply Chain,” International Journal of Production Research, vol. 60, no. 1, pp.
162-183, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9]
Theresa Sobb, Benjamin Turnbull, and Nour Moustafa, “Supply
Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future
Directions,” Electronics, vol. 9, no.
11, pp. 1-31, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[10] Oluwabunmi Layode et al.,
“Addressing Cybersecurity Challenges in Sustainable Supply Chain Management: A
Review of Current Practices and Future Directions,” International Journal of Management & Entrepreneurship Research,
vol. 6, no. 6, pp. 1954-1981, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Om Pal, and Vandana
Srivastava, and Bashir Alam, “Cyber Security Risks and Challenges in Supply
Chain,” International Journal of Advanced
Research in Computer Science, vol. 8, no. 5, pp. 662-666, 2017.
[CrossRef]
[Google Scholar] [Publisher Link]
[12] Naeem Firdous Syed et al.,
“Traceability in Supply Chains: A Cyber Security Analysis,” Computers & Security, vol. 112,
2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Luca Urciuoli et al.,
“Supply Chain Cyber Security–Potential Threats,” Information & Security: An International Journal, vol. 29, no.
1, pp. 51-68, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Isaac Daniel
Sánchez-García, Jezreel Mejía, and Tomás San Feliu Gilabert, “Cybersecurity
Risk Assessment: A Systematic Mapping Review, Proposal, and Validation,” Applied Sciences, vol. 13, no. 1, pp.
1-29, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[15] Andrew Fielder et al.,
“Risk Assessment Uncertainties in Cybersecurity Investments,” Games, vol. 9, no. 2, pp. 1-14, 2018.
[CrossRef]
[Google Scholar] [Publisher
Link]
[16] Valentina Petrova, “A
Cybersecurity Risk Assessment,” International
Scientific Journal “Industry 4.0”, vol. 6, no. 1, pp. 37-40, 2021.
[Google Scholar] [Publisher
Link]
[17] Yuanhang He et al., “A
Survey on Zero Trust Architecture: Challenges and Future Trends,” Wireless Communications and Mobile Computing,
vol. 2022, no. 1, pp. 1-13, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Nishant Kumar et al.,
“Blockchain Adoption for Data Integrity in Higher Education E-Learning,” International Conference on Data Analytics
for Business and Industry, Sakheer, Bahrain, pp. 1-6, 2021.
[CrossRef]
[Google Scholar] [Publisher Link]
[19] Avijit Roy, Anik Dhar, and
Sejuti Sarker Tinny, “Strengthening IoT Cybersecurity with Zero Trust
Architecture: A Comprehensive Review,” Journal
of Computer Science and Information Technology, vol. 1, no. 1, pp. 25-50,
2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Vinden Wylde et al.,
“Cybersecurity, Data Privacy and Blockchain: A Review,” SN Computer Science, vol. 3, no. 2, pp. 1-12, 2022.
[CrossRef]
[Google Scholar] [Publisher Link]