The IT Law Wiki
Tag: Source edit
Tag: Source edit
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
== Citation ==
 
== Citation ==
   
[[National Institute of Standards and Technology]], '''NIST Special Publication 1800-34A:''' (Preliminary Draft) Validating the Integrity of Computing Devices (Aug. 31, 2021). ([https://www.nccoe.nist.gov/sites/default/files/library/sp1800/nist-sp1800-34a-tpm-sca-preliminary-draft.pdf full-text]).
+
[[National Institute of Standards and Technology]], '''NIST Special Publication 1800-34B:''' (Preliminary Draft) Validating the Integrity of Computing Devices (Aug. 31, 2021). ([https://www.nccoe.nist.gov/sites/default/files/library/sp1800/nist-sp1800-34a-tpm-sca-preliminary-draft.pdf full-text]).
   
 
== Overview ==
 
== Overview ==
   
Organizations are increasingly at [[risk]] of [[cyber supply chain]] [[compromise]], whether [[intentional] or [[unintentional]]. [[Cyber supply chain]] [[risk]]s include [[counterfeit]]ing, [[unauthorized]] production, [[tampering]], [[theft]], and insertion of unexpected [[software]] and [[hardware]]. Managing these [[risk]]s requires ensuring the [[integrity]] of the [[cyber supply chain]] and its products and services. This project will demonstrate how organizations can [[verify]] that the internal components of the [[computing device]]s they acquire are genuine and have not been unexpectedly altered during manufacturing or distribution processes.
+
Organizations are increasingly at [[risk]] of [[cyber supply chain]] [[compromise]], whether [[intentional]] or [[unintentional]]. [[Cyber supply chain]] [[risk]]s include [[counterfeit]]ing, [[unauthorized]] production, [[tampering]], [[theft]], and insertion of unexpected [[software]] and [[hardware]]. Managing these [[risk]]s requires ensuring the [[integrity]] of the [[cyber supply chain]] and its products and services. This project will demonstrate how organizations can [[verify]] that the internal components of the [[computing device]]s they acquire are genuine and have not been unexpectedly altered during manufacturing or distribution processes.
  +
 
[[Category:Publication]]
 
[[Category:Publication]]
 
[[Category:2021]]
 
[[Category:2021]]

Latest revision as of 02:52, 26 September 2021

Citation[]

National Institute of Standards and Technology, NIST Special Publication 1800-34B: (Preliminary Draft) Validating the Integrity of Computing Devices (Aug. 31, 2021). (full-text).

Overview[]

Organizations are increasingly at risk of cyber supply chain compromise, whether intentional or unintentional. Cyber supply chain risks include counterfeiting, unauthorized production, tampering, theft, and insertion of unexpected software and hardware. Managing these risks requires ensuring the integrity of the cyber supply chain and its products and services. This project will demonstrate how organizations can verify that the internal components of the computing devices they acquire are genuine and have not been unexpectedly altered during manufacturing or distribution processes.