Report - Assessing Supply Chain Cyber RisksAssessing Supply Chain Cyber Risks Preprint 2.1 Probability of a Sufficiently Harmful Attack We start by describing how to estimate the probability

Please pass captcha verification before submit form