Supply Chain Attack
nounid
4290·updated May 9, 2026candidate
Attacks that allow the adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, or manipulate information technology hardware, software, operating systems, peripherals (information technology products) or services at any point during the life cycle.
MWE
Classifications
Entity Type
Threat95%llm-generatedllm:claude-haiku-4-5
Sensitivity
Regulated85%llm-generatedllm:claude-haiku-4-5
Information Class
Cui75%llm-generatedllm:claude-haiku-4-5
Variants
- plural
- Supply Chain Attacks
- possessive
- Supply Chain Attack's
- pluralpossessive
- Supply Chain Attacks'
Framework definitions
- §1
- Attacks that allow the adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, or manipulate information technology hardware, software, operating systems, peripherals (information technology products) or services at any point during the life cycle.
- §1
- Attacks that allow the adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, or manipulate information technology hardware, software, operating systems, peripherals (information technology products) or services at any point during the life cycle.
Outgoing relationships
No outgoing triples
This term is not the subject of any RDF-style relationship yet.
Incoming relationships
No incoming triples
No other term currently asserts a relationship to this one.