Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Protecting Agriculture Critical Infrastructure

Vulnerabilities are only weak spots when they are abused. According to multiple government reports, professional criminals and state actors have become a serious risk for business and governments22. Criminals become more professional and have more equipment and tooling to execute cyber hacks. Data, money and other valuable assets such as intellectual property, confidential business data, personal information and the continuity and integrity of digital processes can be abused by malicious actors.

A secure chain is only as strong as the weakest link

Challenges are not only visible on an organizational level, but are strongly chain focused. The agrifood sector is operating in chains or networks and is dependable on other chain organizations or third parties. Some risks are obscured and/or displaced outside an organization's span of control. A secure organization, chain and network are therefore a shared responsibility. When managing the risks of the whole chain,

it is important to identify not only the physical chain, but also the "digital chain". This chain effect has been proven in other sectors by, for example, the disruptions that occurred some time ago by DDoS attacks on Dutch banks, government departments such as DigiD23 and - when it comes to system failures - the power failures in Noord- Holland24. The impact of a non-functioning chain is exceptionally high and costly25.

A secure chain is only as strong as the weakest link.

A successful cybersecurity attack can have major impact, not only on the IT side but especially on the business. Some consequences are loss of reputation or loss of business due to system downtime (for example costs of not-harvesting). For an organization to take control, it has to ask itself: Are our digital "crown jewels" and reputation adequately protected and under control? And if my system fails, is my business resilient enough to recover?

Total security is an illusion and in most cases impossible to achieve, due to the substantial impact security measures can have on society and individuals. To find the balance in security, freedom, social and economic growth has become a challenge nowadays. We can combine digital innovation and transformation within acceptable risks. To cope with these vulnerabilities and threats, multiple technical solutions or standards can help to mitigate threats and risks. But improving cooperation - both internal and external at various levels - by sharing knowledge, expertise and expe- riences is one of the basics in developing cybersecurity resilience in the organization and the agrifood chain.

Agrifood processes not considered "vital" by government

In 2010 the Dutch government labeled several sectors as being "vital". In 2015

this process was repeated but now from the perspective of vital processes instead of vital sectors. This time agrifood processes were not labeled as vital. They were assessed as being too fragmented and therefore incapable of disrupting society or the economy. But how much impact does it have when processes for assuring food quality and food production seem vulnerable to cyber threats? Is this assessment changing with the fast digitalization of the food chain? When a shortage in crops

or unreliable quality manifests, societal unrest arises. But when vulnerabilities and outages of continuity become reality, the food production processes and geographic distribution of the products will show to have a great level of resilience due to the vast networks of the food supply chain. No branch of the food chain will be threatened

as a result of outages in the major food production locations. Moreover, when food supply is thin, products can be replaced by similar or alternative products to balance the shortage. This is why food production and distribution processes are not catego- rized as "vital infrastructure" by the Dutch government (2015).

But the vulnerabilities of the (digital) food supply chain is more and more dependable on other products and services that are labeled as "vital", of which the most important ones are drinking water, energy en transport. Besides continuity and security of food supply, food safety and quality control are vital pillars of the food business. But what happens when fraud is committed? Our attention has been drawn to the fact that there is no information on how little attention there is for cybersecurity as a consolidating factor in data on quality of produced food in an ever digitalizing chain26.

Agrifood businesses struggle with cyber security measures Agrifoodcompaniess support27 the view that digital data exchange is increasing in the agrifood sector. They mention not only technology as a main driver, but also the growing need for traceability, increasing need of customers and consumers for information on sustainability and further globalization of our food supply chains.

Indeed, data is considered as a valuable asset for companies in the agrifood sector. Farm data is seen as farmers' new product alongside its crops and animals, and needs appropriate security.

According to the companies interviewed, sensitive data in the agrifood sector particularly concerns business data, being valuable information for the market and its competitors. For instance food product prescriptions but also plans for take-over are considered as market-sensitive data. And for each food supply chain (dairy, meat, vegetables etc.) in the agrifood sector the risks and vulnerabilities will be different. Cyber attacks by hacktivists in order to damage the reputation of companies are seen as an increased threat. Also the increase of extortion was named in which firm data is taking hostage.

Some businesses wonder whether the agrifood sector has sufficient awareness of cybersecurity compared to other sectors. It seems that awareness in the IT and software companies as service provider of the agrifood sector, is high enough. And large food enterprises (especially multinationals) also seem to be reasonably aware of cybersecurity. Also due to their accountancy firms that carry out risk assessments and impose arrangements to meet cybercrime attacks. And also because of the new stricter privacy and data protection regulation with the obligation for data controllers to notify data breaches and higher fines.

So how should the agrifood sector deal with cybersecurity taking into account that a lot of agrifood chains operate in an international environment, crossing borders, and dealing with different legislation? Also the different cultural biases and legal systems between US, Europe and Asia on cybercrime should be taken into account. Opinions vary on how a joint approach should look like. Who should take responsibility, who will organize it and who should be involved? The large and more powerful companies in the agrifood sector such as multinationals or European purchasing alliances of the supermarket groups? And how will the costs and benefits be divided among the involved parties along the food supply chain?

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M91768625
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Business Management

Compare and contrast the five file system options available

Compare and contrast the five file system options available in Windows Server 2012 R2, and discuss when you think it is appropriate to use each one.

Questionexample of an organization that has recently

Question: Example of an organization that has recently undertaken a proactive change. How it affect company? Also example of an organization that has recently undertaken a reactive change. How it affect company?

What is the benefit the beyond budgeting please also

What is the benefit the Beyond budgeting? Please also explain how each are used.

Realizes that the price of socks increased from 500 a pair

Realizes that the price of socks increased from $5.00 a pair to $8.00 a pair. Now, Kenny only consumes 3 Nike Air Jordan shoes instead of his initial intent of purchasing 10 shoes. What is the cross price elasticity of d ...

Task descriptionthe objective of this reflective essay is

Task Description The objective of this reflective essay is to summarize what you learned from the unit and how you believe your learnings could be applied by you in your future career goals. Sections: Section one: For we ...

How might providing employees with a shortened workday

How might providing employees with a shortened workday contribute to motivation from an equity theory perspective? Also from a need theory perspective?

Is there any difference in terms of the information that

Is there any difference in terms of the information that could be provided to the decision maker by an IS that was created using HSM and an IS that was created using SSM?

Describe how logistics managers can use the basic financial

Describe how Logistics Managers can use the basic financial information such as the Income Statement and Balance Sheet? How can they be used to examine the effect of logistics decisions?

Do you all think that fear of retaliation may affect

Do you all think that fear of "retaliation" may affect decisions by individuals in today's health care organizations? Do you all think that some of the specialized areas of expertise i.e. surgical areas, may have some in ...

What issues may arise from the person with the particular

What issues may arise from the person with the particular religious preference, those around that person who may be interested in opportunties that person is being tapped for, and for the organization in building their b ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As