Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Supply chain attack
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Supply_chain_attack
http://dbpedia.org/ontology/abstract Un ataque a la cadena de suministro (en inUn ataque a la cadena de suministro (en inglés supply chain attack), también llamado ataque de cadena de valor o ataque de terceros,​ consiste en comprometer proveedores digitales de servicios externos (proveedores de servicios de internet, proveedores de telecomunicaciones, proveedores de software, proveedores de servicios externos, proveedores de hardware,...) como instrumento para infiltrarse desde allí en una organización objetivo. El asegurarse de que los proveedores de servicios externos son confiables es extremadamente difícil. La indirección dificulta la identificación del atacante.​ Este tipo de ataques tienen gran potencial debido a que un proveedor puede dar servicio a muchos clientes, los cuales a su vez pueden ser proveedores de otros. De esta forma, en una sola operación puede infectar todos los clientes .​ación puede infectar todos los clientes .​ , A supply chain attack is a cyber-attack thA supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018. The , Eastern European , as well as the computer worm are examples of supply chain attacks. Supply chain management experts recommend strict control of an institution's supply network in order to prevent potential damage from cyber criminals.ent potential damage from cyber criminals. , 供应链攻击是一種傳播間諜軟件的方式,一般通過產品軟件官網或軟件包存儲庫進行傳播。通常供应链攻击是一種傳播間諜軟件的方式,一般通過產品軟件官網或軟件包存儲庫進行傳播。通常來說,黑客會瞄準部署知名軟件官網的服務器,篡改服務器上供普通用戶下載的軟件源代碼,將間諜軟件傳播給前往官網下載軟件的用戶。 此外,黑客還會向一些軟件開發者常用的软件包存储库如npm、PyPI和RubyGems等注入帶有惡意代碼的軟件包。這些軟件包在用戶下載後安裝時會觸發惡意行為。 比較知名的供應鏈攻擊事有XcodeGhost风波、Target公司的安全漏洞、東歐的ATM惡意軟件,以及震网(Stuxnet)電腦蠕蟲等。 供應鏈管理專家建議,為了避免網路犯罪的潛在損失,要對組織的供應網路進行嚴格的控管。 供應鏈管理專家建議,為了避免網路犯罪的潛在損失,要對組織的供應網路進行嚴格的控管。
http://dbpedia.org/ontology/thumbnail http://commons.wikimedia.org/wiki/Special:FilePath/Supply_chain_network.png?width=300 +
http://dbpedia.org/ontology/wikiPageExternalLink https://www.wired.com/2009/06/new-atm-malware-captures-pins-and-cash/ + , https://www.cyberark.com/resources/threat-research-blog/golden-saml-newly-discovered-attack-technique-forges-authentication-to-cloud-apps +
http://dbpedia.org/ontology/wikiPageID 19755176
http://dbpedia.org/ontology/wikiPageLength 47370
http://dbpedia.org/ontology/wikiPageRevisionID 1116847925
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/USAID + , http://dbpedia.org/resource/Cybersecurity_and_Infrastructure_Security_Agency + , http://dbpedia.org/resource/SolarWinds + , http://dbpedia.org/resource/Comprehensive_National_Cybersecurity_Initiative + , http://dbpedia.org/resource/Point_of_sale + , http://dbpedia.org/resource/Check_digit + , http://dbpedia.org/resource/Watering_hole_attack + , http://dbpedia.org/resource/Computer_crime + , http://dbpedia.org/resource/Cyber-attack + , http://dbpedia.org/resource/Automated_teller_machine + , http://dbpedia.org/resource/Wired_%28magazine%29 + , http://dbpedia.org/resource/HVAC + , http://dbpedia.org/resource/Computer_worm + , http://dbpedia.org/resource/Kill_chain + , http://dbpedia.org/resource/Web_shell + , http://dbpedia.org/resource/File:Target_Westminster%2C_MD_%287505810590%29.jpg + , http://dbpedia.org/resource/Security_Assertion_Markup_Language + , http://dbpedia.org/resource/United_States_Department_of_Homeland_Security + , http://dbpedia.org/resource/REvil + , http://dbpedia.org/resource/Bushehr_Nuclear_Power_Plant + , http://dbpedia.org/resource/File:Supply_chain_network.png + , http://dbpedia.org/resource/Politics_of_Iran + , http://dbpedia.org/resource/Programmable_logic_controller + , http://dbpedia.org/resource/Depository_Trust_&_Clearing_Corporation + , http://dbpedia.org/resource/Supply_chain_management + , http://dbpedia.org/resource/Cyber_weapon + , http://dbpedia.org/resource/Malware + , http://dbpedia.org/resource/Category:Cryptographic_attacks + , http://dbpedia.org/resource/Information_technology + , http://dbpedia.org/resource/Supply_and_demand + , http://dbpedia.org/resource/National_Nuclear_Security_Administration + , http://dbpedia.org/resource/File:Iran_NPP_CIMG2451_m1.jpg + , http://dbpedia.org/resource/Microsoft + , http://dbpedia.org/resource/Kaspersky_Lab + , http://dbpedia.org/resource/2020_United_States_federal_government_data_breach + , http://dbpedia.org/resource/Small_and_medium-sized_enterprises + , http://dbpedia.org/resource/NortonLifeLock + , http://dbpedia.org/resource/FireEye + , http://dbpedia.org/resource/Target_Corporation + , http://dbpedia.org/resource/Supply_chain + , http://dbpedia.org/resource/Advanced_persistent_threat + , http://dbpedia.org/resource/Office_of_Management_and_Budget + , http://dbpedia.org/resource/NIST + , http://dbpedia.org/resource/FBI + , http://dbpedia.org/resource/Exchange_Server + , http://dbpedia.org/resource/Eli_Lilly_and_Company + , http://dbpedia.org/resource/Enriched_uranium +
http://dbpedia.org/property/%3F  yes
http://dbpedia.org/property/date January 2022
http://dbpedia.org/property/reason What about now? Maybe should be changed to "Microsoft worked with FireEye to..."?
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Further + , http://dbpedia.org/resource/Template:Main + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:Anchor + , http://dbpedia.org/resource/Template:Update_inline + , http://dbpedia.org/resource/Template:Citation_style + , http://dbpedia.org/resource/Template:Notelist + , http://dbpedia.org/resource/Template:Use_dmy_dates + , http://dbpedia.org/resource/Template:Efn + , http://dbpedia.org/resource/Template:Short_description +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Cryptographic_attacks +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Supply_chain_attack?oldid=1116847925&ns=0 +
http://xmlns.com/foaf/0.1/depiction http://commons.wikimedia.org/wiki/Special:FilePath/Target_Westminster%2C_MD_%287505810590%29.jpg + , http://commons.wikimedia.org/wiki/Special:FilePath/Iran_NPP_CIMG2451_m1.jpg + , http://commons.wikimedia.org/wiki/Special:FilePath/Supply_chain_network.png +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Supply_chain_attack +
owl:sameAs http://es.dbpedia.org/resource/Ataque_a_cadena_de_suministro + , http://zh.dbpedia.org/resource/%E4%BE%9B%E5%BA%94%E9%93%BE%E6%94%BB%E5%87%BB + , https://global.dbpedia.org/id/4vuzs + , http://dbpedia.org/resource/Supply_chain_attack + , http://he.dbpedia.org/resource/%D7%AA%D7%A7%D7%99%D7%A4%D7%AA_%D7%A9%D7%A8%D7%A9%D7%A8%D7%AA_%D7%94%D7%90%D7%A1%D7%A4%D7%A7%D7%94 + , http://yago-knowledge.org/resource/Supply_chain_attack + , http://rdf.freebase.com/ns/m.04n63df + , http://www.wikidata.org/entity/Q7644524 +
rdf:type http://dbpedia.org/class/yago/Event100029378 + , http://dbpedia.org/class/yago/WikicatCryptographicAttacks + , http://dbpedia.org/class/yago/Operation100955060 + , http://dbpedia.org/class/yago/Attack100972621 + , http://dbpedia.org/class/yago/YagoPermanentlyLocatedEntity + , http://dbpedia.org/class/yago/Abstraction100002137 + , http://dbpedia.org/class/yago/Activity100407535 + , http://dbpedia.org/class/yago/Act100030358 + , http://dbpedia.org/class/yago/PsychologicalFeature100023100 +
rdfs:comment A supply chain attack is a cyber-attack thA supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.n attacks increased by 78 percent in 2018. , Un ataque a la cadena de suministro (en inUn ataque a la cadena de suministro (en inglés supply chain attack), también llamado ataque de cadena de valor o ataque de terceros,​ consiste en comprometer proveedores digitales de servicios externos (proveedores de servicios de internet, proveedores de telecomunicaciones, proveedores de software, proveedores de servicios externos, proveedores de hardware,...) como instrumento para infiltrarse desde allí en una organización objetivo. El asegurarse de que los proveedores de servicios externos son confiables es extremadamente difícil. La indirección dificulta la identificación del atacante.​ Este tipo de ataques tienen gran potencial debido a que un proveedor puede dar servicio a muchos clientes, los cuales a su vez pueden ser proveedores de otros. De esta forma, en una sola operación pued De esta forma, en una sola operación pued , 供应链攻击是一種傳播間諜軟件的方式,一般通過產品軟件官網或軟件包存儲庫進行傳播。通常供应链攻击是一種傳播間諜軟件的方式,一般通過產品軟件官網或軟件包存儲庫進行傳播。通常來說,黑客會瞄準部署知名軟件官網的服務器,篡改服務器上供普通用戶下載的軟件源代碼,將間諜軟件傳播給前往官網下載軟件的用戶。 此外,黑客還會向一些軟件開發者常用的软件包存储库如npm、PyPI和RubyGems等注入帶有惡意代碼的軟件包。這些軟件包在用戶下載後安裝時會觸發惡意行為。 比較知名的供應鏈攻擊事有XcodeGhost风波、Target公司的安全漏洞、東歐的ATM惡意軟件,以及震网(Stuxnet)電腦蠕蟲等。 供應鏈管理專家建議,為了避免網路犯罪的潛在損失,要對組織的供應網路進行嚴格的控管。 供應鏈管理專家建議,為了避免網路犯罪的潛在損失,要對組織的供應網路進行嚴格的控管。
rdfs:label 供应链攻击 , Ataque a cadena de suministro , Supply chain attack
hide properties that link here 
http://dbpedia.org/resource/Supply-chain_attack + http://dbpedia.org/ontology/wikiPageRedirects
http://dbpedia.org/resource/HTTPS + , http://dbpedia.org/resource/Asus + , http://dbpedia.org/resource/EMV + , http://dbpedia.org/resource/Double_Dragon_%28hacking_group%29 + , http://dbpedia.org/resource/Timeline_of_Internet_conflicts + , http://dbpedia.org/resource/Lazarus_Group + , http://dbpedia.org/resource/Cisco_Talos + , http://dbpedia.org/resource/Mandiant + , http://dbpedia.org/resource/Office_of_Intelligence_and_Counterintelligence + , http://dbpedia.org/resource/PrivateCore + , http://dbpedia.org/resource/Cryptocurrency_wallet + , http://dbpedia.org/resource/British_Airways_data_breach + , http://dbpedia.org/resource/HashiCorp + , http://dbpedia.org/resource/Supply_chain + , http://dbpedia.org/resource/Cyberattack + , http://dbpedia.org/resource/Bloomberg_News + , http://dbpedia.org/resource/Keystroke_logging + , http://dbpedia.org/resource/Corporate_warfare + , http://dbpedia.org/resource/Chinese_espionage_in_the_United_States + , http://dbpedia.org/resource/Secure_communication + , http://dbpedia.org/resource/Rings_of_Power + , http://dbpedia.org/resource/Card_reader + , http://dbpedia.org/resource/Web_skimming + , http://dbpedia.org/resource/Crypto-shredding + , http://dbpedia.org/resource/Power_projection + , http://dbpedia.org/resource/Chinese_intelligence_activity_abroad + , http://dbpedia.org/resource/List_of_security_hacking_incidents + , http://dbpedia.org/resource/2020_United_States_federal_government_data_breach + , http://dbpedia.org/resource/2021_Microsoft_Exchange_Server_data_breach + , http://dbpedia.org/resource/Software_supply_chain + , http://dbpedia.org/resource/Supply-chain_attack + , http://dbpedia.org/resource/Supply-chain_attacks + http://dbpedia.org/ontology/wikiPageWikiLink
http://dbpedia.org/resource/Double_Dragon_%28hacking_group%29 + http://dbpedia.org/property/methods
http://en.wikipedia.org/wiki/Supply_chain_attack + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Supply_chain_attack + owl:sameAs
http://dbpedia.org/resource/Certificate_authority + rdfs:seeAlso
 

 

Enter the name of the page to start semantic browsing from.