2021
DOI: 10.1109/msec.2021.3051235
|View full text |Cite
|
Sign up to set email alerts
|

Perspectives on the SolarWinds Incident

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

2
37
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 58 publications
(40 citation statements)
references
References 1 publication
2
37
0
1
Order By: Relevance
“…Members of the IEEE Security & Privacy editorial board described the attack as the result of inadequate cyber defenses, an exploit of insiders, and an exploit of privileges in the software supply chains (Peisert et al, 2021). These professionals pointed out several revelations about the attack including that: network management software is not secure, adding more tools does not add enhanced security, security procedures are designed for first-party software, and that software supply-chain attacks are as important as,if not more importanthan hardware supply-chain attacks (Peisert et al, 2021). They also stated that although combining software code and libraries from various sources may be a good approach for developing tools quickly and inexpensively; it may not be quite as effective with regard to developing tools securely.…”
Section: Literature Reviewmentioning
confidence: 99%
See 4 more Smart Citations
“…Members of the IEEE Security & Privacy editorial board described the attack as the result of inadequate cyber defenses, an exploit of insiders, and an exploit of privileges in the software supply chains (Peisert et al, 2021). These professionals pointed out several revelations about the attack including that: network management software is not secure, adding more tools does not add enhanced security, security procedures are designed for first-party software, and that software supply-chain attacks are as important as,if not more importanthan hardware supply-chain attacks (Peisert et al, 2021). They also stated that although combining software code and libraries from various sources may be a good approach for developing tools quickly and inexpensively; it may not be quite as effective with regard to developing tools securely.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They also stated that although combining software code and libraries from various sources may be a good approach for developing tools quickly and inexpensively; it may not be quite as effective with regard to developing tools securely. (Peisert et al, 2021).…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations