Malware


Malware may be introduced via virtually any part of the supply chain network, leaving the remainder of that chain (depicted in the green-to-red change) vulnerable to attack. This can occur during many different stages: when the prime contractor purchases software (1,2); when the sub-contractor obtains software from a domestic developer that employs foreign developers (3); or when legacy (reuse) software contains code that was not constructed with a modern emphasis on security (4).

Malware may be introduced via virtually any part of the supply chain network, leaving the remainder of that chain (depicted in the green-to-red change) vulnerable to attack. This can occur during many different stages: when the prime contractor purchases software (1,2); when the sub-contractor obtains software from a domestic developer that employs foreign developers (3); or when legacy (reuse) software contains code that was not constructed with a modern emphasis on security (4).  More »