SAN FRANCISCO -- A supply chain management expert studying ways companies can crack down on cheaply made imitation parts and software is urging software makers and manufacturers of electronic devices to develop better technologies to weed out fraudulent items. The problem is extremely serious, because fake items pose a serious security threat to consumers and businesses. There are some ways to address supply chain risk management. But few technologies exist to guard against the manufacturing of phony microchips and other components that could end up in a myriad of devices, including smartphones, automobiles or worse: the space shuttle. Speaking at the Security B-Sides conference in San Francisco, Monday, Hart Rossman, vice president and CTO for cyber programs at McLean, Va.-based Science Applications International Corp. (SAIC), cited an internal study conducted by NASA, which found that a number of counterfeit electronics that it aboard the space shuttle into outer space.
You may
have a
situation
where a very inexpensive
part causes
the failure
of a
multibillion dollar system.
Hart Rossman
Vice president and CTOSAIC
"If you ship a component that is counterfeit and it goes into an automobile, it can be recalled, but what if you ship a counterfeit component that goes into a space shuttle?" Rossman asked. "It can be very difficult to determine if something is genuine or an unauthorized copy." The lack of focus on supply chain security is flooding the market with fraudulent parts and devices. The problem is a growing threat to the consumer electronics industry, which is concerned that malware can be placed on digital music players, laptops and smartphones at some point in the supply chain. While it poses major privacy issues for consumers and a serious security risk if the malware steals data, it also can be costly to consumer electronics companies that have to deal with the fall out by providing recourse -- either a new device or compensation -- to potentially thousands of customers.
The cyber supply chain is made up of a mixture of hardware and software vendors that are connected via software development kits or some kind of network backbone, Rossman said. It is made up of businesses that create devices like smartphones and computer systems as well as companies that heavily use information technology for products and services, such as the pharmaceutical industry.
Fraudulent parts can cause catastrophic damage, but even pose significant monetary damage to businesses, Rossman said. The problem stems from a lack of dialogue between manufacturers and their partners because much of the information contains proprietary data, highly safeguarded by companies and the manufacturers they deal with. "Record keeping is nonexistent or incongruous at best," Rossman said.
read more>> courtesy : techtarget.com
Posted via email from Mahesh Kamath's Posterous