An Analysis of Software Supply Chain Attacks – Part Two

A business needs to trust the authors of the software it uses. The business must trust the authors don’t add backdoor functionality into the software that would undermine their security, intentionally or unknowingly. A respectable business is not going to intentionally add a backdoor, so normal supplier selection processes will ensure the business is not attacked directly by the authors. But it is more difficult to be sure that no back door is introduced without the authors knowing, either by mistake or because someone else made unwanted modifications.

Leave a Reply

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.