IT systems or environment risks could be mitigated by developing strategies to combat backdoor vulnerabilities, presence of malicious hardware or software, insertion of counterfeit, unauthorized production, tampering and thefts.