
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
- Publisher's listprice GBP 49.99
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 5 060 Ft off)
- Discounted price 20 240 Ft (19 276 Ft + 5% VAT)
25 299 Ft
Availability
Not yet published.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher CRC Press
- Date of Publication 14 July 2025
- ISBN 9781032955315
- Binding Hardback
- No. of pages120 pages
- Size 234x156 mm
- Language English
- Illustrations 11 Illustrations, black & white; 11 Halftones, black & white 700
Categories
Short description:
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering.
MoreLong description:
The world about a week ago witnessed what is probably the largest Cyber Supply Chain Attack ever known to humankind. The magnitude of this attack only merely underscores the sheer level of interconnectivity that exists today. Because of this, the chances of this happening many more times is very high. For instance, all it takes is just one weakness, vulnerability, or a backdoor for the Cyberattacker to exploit, and from there, deploy the malicious payload which will then be sent to thousands of victims worldwide.
This book will focus not only upon the two previous Supply Chain Attacks have recently happened, but it will also focus upon the Critical Infrastructure here in the United States. This includes the food supply chain, the water supply system the national power grid, and even the nuclear power facilities. Many of these establishments have been built with technology that was developed in the late 1960s and the early 1970s. Many of the vendors that built these technologies are now, for the most part, no longer in existence. Many of these are ICS and SCADA systems, and as a result, they also have many vulnerabilities from which a Cyberattacker can penetrate into a launch malicious payload, which will result in yet another form of a Cyber Supply Chain Attack.
Therefore, this book will focus upon the following:
*A Review Of the Critical Infrastructure of the United States
*A Review Of the Solar Winds Supply Chain Attack
*A Review As To How A Malicious Payload Can Created And Inserted, using SQL Injection Attacks as the primary example.
*A Critical Examination As To How Supply Chain Attacks Can Be Mitigated.
Table of Contents:
Chapter 1: An Overview Into Cybersecurity Chapter 2: An Overview of Supply Chain Attacks & Critical Infrastructure Chapter 3: Real World Supply Chain Attacks Chapter 4: How To Mitigate The Risks of Supply Chain Attacks
More
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
Subcribe now and receive a favourable price.
Subscribe
25 299 HUF