DATABASE SECURITY IN SUPPLY CHAIN SYSTEMS: SAFEGUARDING VENDOR INFORMATION, TRANSACTION RECORDS, AND THIRD-PARTY DATA EXCHANGE MECHANISMS

Authors

  • Rohit Ahuja Vice President - Software Engineering, J.P. Morgan Chase, 575 Washington Blvd, Jersey City, U.S.

DOI:

https://doi.org/10.29121/digisecforensics.v2.i1.2025.94

Keywords:

Database Security, Supply Chain Management, Vendor Information Protection, Transaction Records, Third-Party Data Exchange, Cybersecurity Threats, Blockchain Encryption., Dynamic Capabilities

Abstract

This study investigates database security challenges within supply chain systems, focusing on protecting vendor information, transaction records, and third-party data exchange mechanisms. Employing a mixed-methods approach, including a systematic literature review, surveys of 200 supply chain professionals, and simulation modeling using Python-based algorithms, the research identifies key vulnerabilities such as SQL injection attacks and unauthorized third-party access, which contributed to a 42% rise in supply chain cyberattacks in 2021. Main findings reveal that implementing blockchain-integrated encryption reduces breach risks by 35%, while multi-factor authentication enhances vendor data integrity. The analysis underscores the need for dynamic capabilities in resilience-building, aligning with recent studies on cyber risk mitigation. Conclusions emphasize a proposed framework for integrated security protocols, offering theoretical contributions to supply chain management literature and practical implications for policy-makers and practitioners to fortify digital ecosystems against evolving threats.

References

Alghamdi, A. A. (2023). Big Data Optimisation and Management in Supply Chain Management: A Systematic Literature Review. Artificial Intelligence Review, 56, 13715–13758. https://doi.org/10.1007/s10462-023-10505-4 DOI: https://doi.org/10.1007/s10462-023-10505-4

Azis, A. M., and Irjayanti, M. (2024). Strengthening the Accuracy and Visibility of Supply Chain Management Data in the Coffee Industry. Cogent Business and Management, 11(1), Article 2380811. https://doi.org/10.1080/23311975.2024.2380811 DOI: https://doi.org/10.1080/23311975.2024.2380811

Bhardwaj, S., Dwivedi, A., Pandey, A., Perwej, Y., and Khan, P. R. (2023). Machine Learning-Based Crowd Behavior Analysis and Forecasting. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. https://doi.org/10.32628/CSEIT23903104 DOI: https://doi.org/10.32628/CSEIT23903104

Cybersecurity and Infrastructure Security Agency. (2023). Cybersecurity Advisory: Supply Chain Security.

Deloitte. (2022). Global Third-Party Risk Management Survey. Deloitte Touche Tohmatsu Limited.

ENISA. (2022). NIS2 Directive: Threat Landscape. European Union Agency for Cybersecurity.

Identity Theft Resource Center. (2023). 2023 Data Breach Report.

Pankit Arora and Sachin Bhardwaj (2022). Integrating Wireless Sensor Networks and the Internet of Things: A Hierarchical and Security-based Analysis.

Ponemon Institute. (2024). 2024 State of Cybersecurity in Supply Chains.

PRISMA Group. (2020). Preferred Reporting Items for Systematic Reviews and Meta-Analyses.

Saberi, S., Kouhizadeh, M., Sarkis, J., and Shen, L. (2024). Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain. Sustainability, 16(3), 1043. https://doi.org/10.3390/su16031043 DOI: https://doi.org/10.3390/su16031043

Sharma, S. (2019). Data Loss Prevention (DLP) Strategies in Cloud-Hosted Applications. Journal of Theoretical and Computational Advances in Scientific Research, 3(1), 1–8.

Sharma, S. (2020). The Rising Threat of Deepfakes: Security and Privacy Implications. Journal of Artificial Intelligence and Cyber Security, 4(1), 1–6.

Tambi, V. K. (2021). Natural Language Understanding Models for Personalized Financial Services. International Journal of Current Engineering and Scientific Research, 8(1), 1–11.

Tambi, V. K. (2023). Real-Time Data Stream Processing with Kafka-Driven AI Models. International Journal of Current Engineering and Scientific Research.

Tambi, V. K., and Singh, N. (2019). Development of a Project Risk Management System Based on Industry 4.0 Technology and its Practical Implications. International Journal of Innovative Research in Computer and Communication Engineering, 7(11).

Tambi, V. K., and Singh, N. (2020). Analysing Anomaly Process Detection Using Classification Methods and Negative Selection Algorithms. International Journal of Advanced Research in Education and Technology, 7(1).

Tiwari, M. K., Bidanda, B., Geunes, J., Fernandes, K., and Dolgui, A. (2024). Supply Chain Digitisation and Management. International Journal of Production Research, 62(8), 2918–2926. https://doi.org/10.1080/00207543.2024.2316476 DOI: https://doi.org/10.1080/00207543.2024.2316476

Verizon. (2024). 2024 Data Breach Investigations Report. Verizon Business.

World Economic Forum. (2023). Global Risks Report 2023: Supply Chain Disruptions.

Downloads

Published

2025-06-30

How to Cite

Ahuja, R. (2025). DATABASE SECURITY IN SUPPLY CHAIN SYSTEMS: SAFEGUARDING VENDOR INFORMATION, TRANSACTION RECORDS, AND THIRD-PARTY DATA EXCHANGE MECHANISMS. Journal of Digital Security and Forensics, 2(1), 176–185. https://doi.org/10.29121/digisecforensics.v2.i1.2025.94