ImageVerifierCode 换一换
格式:PPTX , 页数:26 ,大小:2.95MB ,
文档编号:2519590      下载积分:34 文币
快捷下载
登录下载
邮箱/手机:
温馨提示:
系统将以此处填写的邮箱或者手机号生成账号和密码,方便再次下载。 如填写123,账号和密码都是123。
支付方式: 支付宝    微信支付   
验证码:   换一换

优惠套餐
 

温馨提示:若手机下载失败,请复制以下地址【https://www.163wenku.com/d-2519590.html】到电脑浏览器->登陆(账号密码均为手机号或邮箱;不要扫码登陆)->重新下载(不再收费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  
下载须知

1: 试题类文档的标题没说有答案,则无答案;主观题也可能无答案。PPT的音视频可能无法播放。 请谨慎下单,一旦售出,概不退换。
2: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
3: 本文为用户(无敌的果实)主动上传,所有收益归该用户。163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

1,本文(Nanotechnology-Behavior-and-Supply-Chains-Managing-Risk-at-a-Platform-Level.pptx)为本站会员(无敌的果实)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!

Nanotechnology-Behavior-and-Supply-Chains-Managing-Risk-at-a-Platform-Level.pptx

1、-Nanotechnology, Behavior & SupplyChains: Managing Risk at a PlatformLevel-#RSACPlatform: platform /platfrm/A group of technologies that are used as a baseupon which other applications, processes ortechnologies are developed.#RSACManagingon#RSACPlatforms are EverywhereManaginon#RSACLawmakers/Regulat

2、orsCloud ProvidersEmployees/Consultants#RSACUnaccounted for RiskIndicia of TrustClosing Trust Gaps6#RSACCloud is a Foundation for the Platform RevolutionIaaSPaaSCaaSDaaSSaaSSTaaSITaaSNaaSDbaaSDRaaSSECaaSHaaSMaaSAccountability Demands Verification#RSACCheck &VerifyTechnology &OperationsAccountability

3、 &Integrity8Accountability Requires Visibility#RSAC9#RSACHow Many Cows Are In a Burger?10H#RSAC#RSACWhat is Lurking In the Shadows?12#RSACTRUST13#RSACTRUSTY O U C A N TW H A T Y O U C A N TP E T E R D R U C K E R14#RSACEnd-to-End Value Chain SecurityS U P P LYD E L I V E R YS E R V I C ES e c u r i

4、t yI n f o r m a t i o n L a y e rTa i n t e d S o l u t i o n sB e h a v i o r a l L a y e rL o g i c a l L a y e rC o u n t e r f e i t e d P a r t sP h y s i c a l L a y e rTe c h n i c a l L a y e rQ u a l i t yN o n c o m p l i a n t P r o d u c t sN o n c o n f o r m i n g P a r t sS A F E T Y

5、R E V E N U EU P T I M E15#RSACCan Trust Scale?CLASSIFIEDEMBEDDED IDENCRYPTED RFIDDNATAGGANTSSECURITY INKRFIDHOLOGRAMSBARCODE/QRPAPERSCALESCALEBuildingTRUSTHuman AccountabilityIdentity of Things17#RSACi nW th ha etF w ui tlu l r Ideentity Look Like in the Future? Single item serialization Down to co

6、mponent level Cradle to grave Secure by design18#RSACAchieve AccountabilityVerifiable / AuditableImmutable supply chain dataIncentivize positive behaviorCreate human-centric policies19#RSACTRUST = the RIGHT Security RIGHT Place RIGHT TimeTRUSTPackage End-to-end multi-tier unifying architecture Addre

7、ss needs & constraints of differentProductstakeholders in the value chain Empower every node in the productAssemblylifecycle ecosystem Evolving & dynamic rolloutComponent20#RSACTa ke the Stakeholders PerspectiveSUPPLIERBUYERDemonstrate Quality& ComplianceManage Quality &ComplianceDistribution & Serv

8、iceNetwork MonitoringEfficient SourcingQualificationDownstream ProductTrackingUpstream ComponentValidation21Third Party Threats & Threat ImpactsThreatsThreat ImpactsManipulationEspionageDisruptionTainted HWCounterfeitIP MisuseInformation Security Breach#RSACAn Adaptable Security ArchitecturePersonne

9、l Securityecurity in Manufacturing & OperationsThird-Tier Partner SecuritySecurity in Service ManagementSecurity in Logistics & StorageInformation ProtectionSecurity Engineering & ArchitecturePhysical & Environmental SecuritySecurity Incident ManagementAsset Management#RSACAn Architectural Layered A

10、pproachInformation SecurityBehavioral SecurityTechnical SecurityPhysical SecurityLogical Security#RSACSteps to Manage Risk at the Platform LevelApply what you have learned:dentify and list the security assumptions about yourplatformsDefine the security requirements for your assetsSeek a robust thread of trust across your platforms valuechainsWork together with your 3rd party partners to deployeffective solutions to ensure that verifiable TRUST is achieved25Transparency and Trust

侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|