dc.contributor.author | Quliyev, Rauf | |
dc.contributor.author | Quluzadə, Rahid | |
dc.contributor.author | Babayev, Riyad | |
dc.date.accessioned | 2024-09-05T08:13:36Z | |
dc.date.available | 2024-09-05T08:13:36Z | |
dc.date.issued | 2024-07-02 | |
dc.identifier.uri | http://hdl.handle.net/123456789/387 | |
dc.description.abstract | The interconnected nature of modern software results in a complex software supply chain, encompassing various elements such as binaries, libraries, tools, and microservices. These components are essential for contemporary software development and are sourced from both open-source and proprietary channels. According to (O’Donoghue, Reinhold, and Izurieta 2024), the software supply chain's complexity has made it increasingly vulnerable to cyberattacks, presenting a significant threat. This vulnerability is heightened by the extensive dependencies within a vendor’s product, where a flaw in one component can affect multiple products. Furthermore, software supply chains have vast attack surfaces, as weaknesses in external transitive dependencies can compromise the integrity of the core system. To combat these challenges, (O’Donoghue, Reinhold, and Izurieta 2024) identify the Software Bill of Materials (SBOM) as a promising tool. When combined with appropriate analysis instruments, SBOMs can effectively identify and neutralize security risks within software supply chains. In their study, they utilized Trivy and Grype—two open-source tools—to scrutinize the security of 1,151 SBOMs collected from third-party software repositories that vary in scope and size. Their investigation sought to understand the prevalence and distribution of vulnerabilities within these SBOMs and identify which software components are most at risk. Their findings underscore the looming danger of supply chain vulnerabilities in software and advocate for the effectiveness of utilizing SBOMs to reinforce software supply chain security. | en_US |
dc.language.iso | en | en_US |
dc.rights | Attribution-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nd/3.0/us/ | * |
dc.subject | Five ways to minimize risk | en_US |
dc.subject | Targeted cyber attacks are an advanced persistent threat | en_US |
dc.subject | SolarWinds incident | en_US |
dc.subject | Zero Trust | en_US |
dc.subject | Risk assessment and management | en_US |
dc.subject | Collaboration and information sharing | en_US |
dc.title | SUPPLY CHAİN ATTACKS | en_US |
dc.type | Thesis | en_US |
The following license files are associated with this item: