10An Enhanced Threat Detection Model to Assist Supply Chain Management Using Artificial Intelligence

Ambika N.

Dept. of Computer Science and Applications, St. Francis College, Bangalore, India

Abstract

The previous framework combines computer algorithms and physical processes to create a comprehensive system. Risk on Screen Character is a potential threat actor or hacker who may attempt to exploit vulnerabilities in the system. Tactics, Techniques, and Procedures (TTP) are strategies and methods used by threat actors to manipulate cybersecurity weaknesses in the supply chain. Cybersecurity in the Supply Chain (CSC) secures the information and processes within the supply chain to ensure the organization’s security and operational goals are met. CSC Requirements are the security requirements and measures used to protect the supply chain from cyber threats. Attack Entity could refer to the threat actor or entity attempting to compromise the supply chain’s cybersecurity. Digital Incident Report is created in response to a cybersecurity incident and can impact the organization’s goals related to inbound and outbound supply chains. The probability of a cyber attack developing into a significant threat is determined by the information and intelligence gathered about the threat actor’s capabilities and intentions. The proposal causes the hash key utilizing the Merkle tree concept creating the trail datasets, and stores them. It improves the system by enhancing security by 8.99% and ...

Get Artificial Intelligence-Enabled Digital Twin for Smart Manufacturing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.