Correct answer 2 and 3
Explanation
2. Cyber-Crime
Cyber-crime encompasses a range of malicious activities that target computer systems and networks. For procurement organizations, this can involve unauthorized access to sensitive data, such as supplier information, contracts, and pricing strategies. Cyber-criminals may employ tactics such as phishing attacks, malware, or exploiting software vulnerabilities. The impact of cyber-crime can be severe, including financial losses, reputational damage, and regulatory penalties if sensitive data is compromised. Furthermore, the disruption of procurement processes can lead to delays in acquiring necessary goods and services, affecting operational efficiency.
3. Ransomware Attacks
Ransomware attacks specifically involve the use of malicious software that encrypts an organization’s data, rendering it inaccessible to legitimate users. In a procurement context, if the data related to suppliers, orders, or procurement contracts is held hostage, it can halt business operations until the organization pays a ransom to the attackers. These attacks can result in not only immediate financial losses due to ransom payments but also long-term consequences such as loss of customer trust, legal liabilities, and significant costs related to recovery and data loss. Organizations must invest in robust cybersecurity measures and have contingency plans in place to mitigate the risks posed by ransomware attacks
Source: Adapted from CIPS L5M2 study guide, pages 79,121
Why other options are wrong
1 and 4 (Under-investment and Cargo theft)
Under-investment is a financial risk rather than a technological risk. While it affects an organization’s capability to invest in necessary technology and infrastructure, it does not directly relate to the technology itself being at risk. Cargo theft, while a significant risk in the supply chain, is a logistical or physical risk rather than a technological risk, focusing on the theft of goods in transit rather than vulnerabilities within IT systems
3 and 4 (Ransomware attack and Cargo theft)
While ransomware attacks represent a technological risk, cargo theft does not. Cargo theft is linked to physical supply chain vulnerabilities, including logistics and transport, rather than an issue arising from technological factors. Therefore, pairing a cybersecurity issue with a logistics issue does not accurately represent the question regarding technological risks
1 and 2 (Under-investment and Cyber-crime)
While cyber-crime is indeed a technological risk, under-investment is not. It pertains to a lack of financial resources allocated to technology, which can lead to vulnerabilities but is not a risk itself related to technology. This pairing incorrectly implies that under-investment is a technological risk when it is more about financial management
Source: Adapted from CIPS L5M2 study guide, pages 28,32