O-TTPS: for ICT Product Integrity and Supply Chain Security – A Management Guide

Nonfiction, Reference & Language, Education & Teaching, Administration, Teaching, Teaching Methods
Cover of the book O-TTPS: for ICT Product Integrity and Supply Chain Security – A Management Guide by The Open Group, Van Haren Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: The Open Group ISBN: 9789401800945
Publisher: Van Haren Publishing Publication: January 24, 2017
Imprint: Van Haren Publishing Language: English
Author: The Open Group
ISBN: 9789401800945
Publisher: Van Haren Publishing
Publication: January 24, 2017
Imprint: Van Haren Publishing
Language: English

This Management Guide provides guidance on why a technology provider should use the Open Trusted Technology Provider Standard (O-TTPS) – Mitigating the Risk of Tainted and Counterfeit Products (approved by ISO/IEC as ISO/IEC 20243:2015) and why they should consider certification to publicly register their conformance to the standard. The O-TTPS is the first standard with a certification program that specifies measurable conformance criteria for both product integrity and supply chain security practices. The standard defines a set of best practices that ICT providers should follow throughout the full life cycle of their products from design through disposal, including their supply chains, in order to mitigate the risk of tainted and counterfeit components. The introduction of tainted products into the supply chain poses significant risk to organizations because altered products can introduce the possibility of untracked malicious behavior. A compromised electronic component or piece of malware enabled software that lies dormant and undetected within an organization could cause tremendous damage if activated remotely. Counterfeit products can also cause significant damage to customers and providers resulting in rogue functionality, failed or inferior products, or revenue and brand equity loss. As a result, customers now need assurances they are buying from trusted technology providers who follow best practices with their own in-house secure development and engineering practices and also in securing their out-sourced components and their supply chains. This guide offers an approach to providing those assurances to customers. It includes the requirements from the standard and an overview of the certification process, with pointers to the relevant supporting documents, offering a practical introduction to executives, managers, and those involved directly in implementing the best practices defined in the standard.As the certification program is open to all constituents involved in a product’s life cycle this guide should be of interest to: • ICT provider companies (e.g. OEMs, hardware and software component suppliers, value-add distributors, and resellers),• Business managers, procurement managers, product managers and other individuals who want to better understand product integrity and supply chain security risks and how to protect against those risks and,• Government and commercial customers concerned about reducing the risk of damage to their business enterprises and critical infrastructures, which all depend heavily on secure ICT for their day-to-day operations.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This Management Guide provides guidance on why a technology provider should use the Open Trusted Technology Provider Standard (O-TTPS) – Mitigating the Risk of Tainted and Counterfeit Products (approved by ISO/IEC as ISO/IEC 20243:2015) and why they should consider certification to publicly register their conformance to the standard. The O-TTPS is the first standard with a certification program that specifies measurable conformance criteria for both product integrity and supply chain security practices. The standard defines a set of best practices that ICT providers should follow throughout the full life cycle of their products from design through disposal, including their supply chains, in order to mitigate the risk of tainted and counterfeit components. The introduction of tainted products into the supply chain poses significant risk to organizations because altered products can introduce the possibility of untracked malicious behavior. A compromised electronic component or piece of malware enabled software that lies dormant and undetected within an organization could cause tremendous damage if activated remotely. Counterfeit products can also cause significant damage to customers and providers resulting in rogue functionality, failed or inferior products, or revenue and brand equity loss. As a result, customers now need assurances they are buying from trusted technology providers who follow best practices with their own in-house secure development and engineering practices and also in securing their out-sourced components and their supply chains. This guide offers an approach to providing those assurances to customers. It includes the requirements from the standard and an overview of the certification process, with pointers to the relevant supporting documents, offering a practical introduction to executives, managers, and those involved directly in implementing the best practices defined in the standard.As the certification program is open to all constituents involved in a product’s life cycle this guide should be of interest to: • ICT provider companies (e.g. OEMs, hardware and software component suppliers, value-add distributors, and resellers),• Business managers, procurement managers, product managers and other individuals who want to better understand product integrity and supply chain security risks and how to protect against those risks and,• Government and commercial customers concerned about reducing the risk of damage to their business enterprises and critical infrastructures, which all depend heavily on secure ICT for their day-to-day operations.

More books from Van Haren Publishing

Cover of the book IT4IT™ Foundation study guide by The Open Group
Cover of the book VeriSM -Unwrapped and Applied by The Open Group
Cover of the book VeriSM™ Professional Courseware by The Open Group
Cover of the book ArchiMate 2.1 Specification by The Open Group
Cover of the book ArchiMate® 3.0.1 Specification by The Open Group
Cover of the book ITIL by The Open Group
Cover of the book PRINCE2 by The Open Group
Cover of the book Projectmanagement op basis van PRINCE2® Editie 2009 by The Open Group
Cover of the book Service Integration and Management Professional Body of Knowledge by The Open Group
Cover of the book Outsourcing Professional Body of Knowledge by The Open Group
Cover of the book TOGAF® Version 9.1 - A Pocket Guide by The Open Group
Cover of the book Contract and Commercial Management - The Operational Guide by The Open Group
Cover of the book PRINCE2® Editie 2009 - Pocket Guide by The Open Group
Cover of the book PRINCE2 in de Praktijk - 7 Valkuilen, 100 Tips - Management guide by The Open Group
Cover of the book IT-servicemanagement op basis van ITIL® 2011 Editie by The Open Group
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy