Essays about: "Supply Chain Security"
Showing result 1 - 5 of 78 essays containing the words Supply Chain Security.
-
1. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
2. Improving Seafood Waste Management in Västra Götaland, for a more environmental sustainable future
University essay from Göteborgs universitet/Graduate SchoolAbstract : Waste management has become a major concern around the world. The amount of waste is significantly growing, resulting in a negative impact on the environment. It is important to address this issue by managing waste effectively and reducing its environmental impact. READ MORE
-
3. Security in the context of the European semiconductor industry : A qualitative content analysis of the European Chips Act
University essay from Stockholms universitet/Institutionen för ekonomisk historia och internationella relationerAbstract : Semiconductors are essential in virtually all electronic devices, ranging from civilian to military applications. The semiconductor industry is therefore a critical, and arguably strategic and security-related, industrial sector. READ MORE
-
4. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
5. Diverse Double-Compiling to Harden Cryptocurrency Software
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE