Loading view.
cybersecurity
Secure Sourcing of COTS Software
VirtualSystems are built by integrating components upwards from the lowest level of the supply chain to the finished, often highly complex, product. That upward integration process represents a potential security weakness.