Atluri, Gresshma (2025) Securing the digital lifeline: Advanced defense strategies against IT supply chain cyberattacks. World Journal of Advanced Engineering Technology and Sciences, 15 (2). pp. 1310-1319. ISSN 2582-8266
![WJAETS-2025-0639.pdf [thumbnail of WJAETS-2025-0639.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJAETS-2025-0639.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
This comprehensive article explores IT supply chain cyberattacks, examining their sophisticated nature and the defensive mechanisms organizations can deploy to mitigate risks. Supply chain attacks target the software development lifecycle, exploiting trusted relationships between vendors and customers to inject malicious code into legitimate applications. The article explores notable incidents that demonstrate the cascading impact and strategic sophistication of these threats. A multifaceted defense framework is presented, encompassing vendor risk management, software composition analysis, code signing, network segmentation, enhanced monitoring, and incident response planning. The transition from reactive to proactive protection models is emphasized, highlighting how organizations can implement layered security controls, establish a security-focused culture, and leverage emerging technologies such as artificial intelligence for more effective threat detection. Through detailed analysis of attack vectors and defensive countermeasures, the article provides security professionals with actionable strategies to enhance supply chain resilience.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjaets.2025.15.2.0639 |
Uncontrolled Keywords: | Authentication; Cybersecurity; Resilience; Segmentation; Verification |
Depositing User: | Editor Engineering Section |
Date Deposited: | 04 Aug 2025 16:31 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/3766 |