Discuss what the process of vendor evaluation should focus on.

What will be an ideal response?


The process of vendor evaluation should particularly focus on identifying any new practices for mitigating the security risks associated with supply chain management. It is vitally important to assure the supply chain, because automated procurement systems have brought a whole new host of Internet-based threats into the supply chain management process. The consequence is that companies who previously never had to worry about being breached through weaknesses in their vendor supply chain now need to have procedures in place to protect themselves from attacks that might originate from their own vendor community. This is not strictly an electronic problem. In order to deal with it, consideration has to be given to potential harm from vendor personnel as well as failures in vendor procedures. Consequently, the SCO role not only has to patrol the company space; it also has to identify all reasonable threats from the people whom the company deals with.

Computer Science & Information Technology

You might also like to view...

What command must be selected in order for the Command Button Wizard to work?

A) Command Button toggle B) Custom Navigation wizard C) Use Control Wizards D) Use Forms Wizard

Computer Science & Information Technology

What areas are covered by security audits but not by security testing?

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ is inserted into a document when you want to format a section differently from others

Fill in the blank(s) with correct word

Computer Science & Information Technology

When using HSRP in a single group redundancy deployment, how many forwarders are allowed to actively handle user traffic at the same time?

A) 2 B) 4 C) 1 D) 8

Computer Science & Information Technology