![]() |
International Journal of Scientific Research and Engineering Development( International Peer Reviewed Open Access Journal ) ISSN [ Online ] : 2581 - 7175 |
IJSRED » Archives » Volume 8 -Issue 5

📑 Paper Information
📑 Paper Title | Managing Cyber Risk in Supply Chains: A Review and Research Agenda |
👤 Authors | Prarthna Sorathiya, Mr.Samir Joshi |
📘 Published Issue | Volume 8 Issue 5 |
📅 Year of Publication | 2025 |
🆔 Unique Identification Number | IJSRED-V8I5P141 |
📝 Abstract
The profound digitalization of global commerce has structurally transformed traditional logistics into interconnected "cyber supply chains" (CSCs), making cyber events a top enterprise risk. In the financial sector alone, the costs average $5.9-$6.08 million per incident. This comprehensive review, leveraging systematic literature analysis and recent empirical data, investigates the critical governance deficiencies and effective mitigation strategies required for systemic resilience.
Findings confirm that supply chain cyber risk—defined as accidental or deliberate IT events threatening infrastructure integrity and leading to cascading disruptions—must be classified holistically across five
categories:
Physical Threats
Breakdown
Direct Attacks
Indirect Attacks
High-impact Insider Threats
Third-party vendors are the dominant vulnerability, accounting for approximately 62% of all breaches. These often occur via software flaws (18.08%) and stolen vendor credentials (16.10%). Mitigation requires a structured, time-phased approach (Pre-, Trans-, and Post-Attack), but implementation maturity is low ; only 36% of institutions continuously monitor vendors, and 68% fail to address fourth-party risk. The solution lies in the integrated
Supply Chain Cyber Security System conceptual model, mandating the strategic alignment of IT, Organizational, and Supply Chain security systems to achieve holistic control. The review concludes by setting a rigorous research agenda focused on empirical modeling, strategic validation, and deeper exploration of behavioral and human factors.
Findings confirm that supply chain cyber risk—defined as accidental or deliberate IT events threatening infrastructure integrity and leading to cascading disruptions—must be classified holistically across five
categories:
Physical Threats
Breakdown
Direct Attacks
Indirect Attacks
High-impact Insider Threats
Third-party vendors are the dominant vulnerability, accounting for approximately 62% of all breaches. These often occur via software flaws (18.08%) and stolen vendor credentials (16.10%). Mitigation requires a structured, time-phased approach (Pre-, Trans-, and Post-Attack), but implementation maturity is low ; only 36% of institutions continuously monitor vendors, and 68% fail to address fourth-party risk. The solution lies in the integrated
Supply Chain Cyber Security System conceptual model, mandating the strategic alignment of IT, Organizational, and Supply Chain security systems to achieve holistic control. The review concludes by setting a rigorous research agenda focused on empirical modeling, strategic validation, and deeper exploration of behavioral and human factors.