As organizations increasingly rely on third-party vendors for various services and products, the need for robust security measures to safeguard sensitive data has become paramount. This study delves into the application of Generative Pre-trained Transformers (GPT) in enhancing third-party vendor security. GPT, a state-of-the-art natural language processing model, offers a versatile framework for addressing security challenges through advanced language understanding and generation capabilities. The research begins by providing an overview of the current landscape of third-party vendor relationships and the associated security risks. By examining recent security incidents and breaches stemming from vendor interactions, the study highlights the urgency of adopting innovative solutions to fortify cybersecurity defenses.
A Comprehensive Analysis of GPT Applications in Third-Party Vendor Security Enhancement
Journal Title: Asian Journal of Multidisciplinary Research & Review
Author(s): Sakthiswaran Rangaraju
Published On: 30/12/2023
First Page: 105
Last Page: 115
Publisher: The Law Brigade Publisher
Cite this Article
Sakthiswaran Rangaraju, A Comprehensive Analysis of GPT Applications in Third-Party Vendor Security Enhancement, Volume 4 Issue 6, Asian Journal of Multidisciplinary Research & Review, 105-115, Published on 30/12/2023, Available at https://ajmrr.thelawbrigade.com/article/a-comprehensive-analysis-of-gpt-applications-in-third-party-vendor-security-enhancement/
Share this research
Copyright © 2024
Ownership and Licensing:
Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal’s published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.