Supplier Threat Flashcards

1
Q

What aspect of external dependencies has become a more apparent problem recently?

A

The supply chain, including potential failures and trustworthiness issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can happen if a key supplier company is bought out?

A

Product support may end, key staff may leave, and needed support might become unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the risk of relying solely on one supplier?

A

It creates a single point of failure; disruptions (like labor issues) at that supplier can halt the entire business dependent on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a potential downside of diversifying suppliers after relying on one?

A

While reducing single-point-of-failure risk, it may have disadvantages (e.g., potentially higher costs, managing more relationships).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What risk arises from suppliers delivering products?

A

They might deliver faulty or insecure products, whether hardware or software elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What specific example illustrates the risk of insecure software components?

A

Industrial control systems using old software components written decades ago without security considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why aren’t these old, insecure software components often updated?

A

No one is interested in paying to have the software rewritten to be secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is intellectual property (IP) ownership a concern with software suppliers?

A

Customers need to ensure they have control over or access to the software IP if needed, especially if the supplier fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What mechanism can provide access to software source code if a vendor fails?

A

Keeping a copy of the source code in escrow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are jurisdictional problems in the context of supply chains?

A

Restrictions on buying from or selling to certain countries, or differing legal requirements (like privacy laws).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ‘reshoring’?

A

Moving operations or production that was previously outsourced offshore back to the local country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why might companies engage in reshoring?

A

To secure the supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What privacy concern arises when outsourcing software development offshore?

A

Sending test data to the third-party developer might violate privacy laws if it includes sensitive information (e.g., PHI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a prominent example of a third-party supplier category?

A

Cloud service providers (for data hosting, processing, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can third-party advertising on a website introduce risk?

A

If the advertising provider is compromised, it can potentially compromise the website displaying the ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What security consideration is crucial when using third parties for data archiving?

A

Ensuring the third party can adequately protect the stored data from compromise.

17
Q

What fundamental assumption should guide secure software design?

A

That the software will be attacked.

18
Q

What knowledge is essential for writing secure software?

A

Familiarity with the various attack vectors and common threats, including those related to the supply chain.