TY - JOUR
T1 - From SolarWinds to Kaseya: The rise of supply chain attacks in a digital world
AU - Ghanbari, Hadi
AU - Koskinen, Kari
AU - Wei, Yijuan
PY - 2024/11/15
Y1 - 2024/11/15
N2 - Supply chains today rely heavily on information technologies. Such reliance has encouraged attackers to shift their focus on conducting supply chain attacks, which is expected to become the most common type of cyberattack by 2030. Thus, it is crucial for Information Systems practitioners to gain a deeper understanding of supply chain cybersecurity. To that end, this teaching case demonstrates the importance of supply chain cybersecurity in the digital era drawing on two recent attacks with significant impact on supply chains: SolarWinds and Kaseya. We first discuss different dimension of cyberattacks, followed by an introduction of supply chain attacks. We then introduce an analytical tool called cyber kill chain that is widely used for analysing different stages of a cyberattack. In addition, we propose a taxonomy of cyberattacks that can be used as a tool, alongside other tools, to analyse cyberattacks. The taxonomy is especially useful for conducting a lightweight analysis and presenting an overview of cyberattacks to non-technical stakeholders, especially executives and directors.
AB - Supply chains today rely heavily on information technologies. Such reliance has encouraged attackers to shift their focus on conducting supply chain attacks, which is expected to become the most common type of cyberattack by 2030. Thus, it is crucial for Information Systems practitioners to gain a deeper understanding of supply chain cybersecurity. To that end, this teaching case demonstrates the importance of supply chain cybersecurity in the digital era drawing on two recent attacks with significant impact on supply chains: SolarWinds and Kaseya. We first discuss different dimension of cyberattacks, followed by an introduction of supply chain attacks. We then introduce an analytical tool called cyber kill chain that is widely used for analysing different stages of a cyberattack. In addition, we propose a taxonomy of cyberattacks that can be used as a tool, alongside other tools, to analyse cyberattacks. The taxonomy is especially useful for conducting a lightweight analysis and presenting an overview of cyberattacks to non-technical stakeholders, especially executives and directors.
KW - Information security
KW - Kaseya
KW - SolarWinds
KW - cyberattack
KW - cybersecurity
KW - supply chain attack
KW - supply chain cybersecurity
UR - http://www.scopus.com/inward/record.url?scp=85209389184&partnerID=8YFLogxK
U2 - 10.1177/20438869241299823
DO - 10.1177/20438869241299823
M3 - Article
SN - 2043-8869
SP - 1
EP - 8
JO - Journal of Information Technology Teaching Cases
JF - Journal of Information Technology Teaching Cases
ER -