Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/1606
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJack Reid
dc.contributor.authorDonna H. Rhodes
dc.date.accessioned2020-03-16T17:59:47Z-
dc.date.available2020-03-16T17:59:47Z-
dc.date.issued2018-04-30
dc.identifier.citationPublished--Unlimited Distribution
dc.identifier.urihttps://dair.nps.edu/handle/123456789/1606-
dc.descriptionAcquisition Management / Defense Acquisition Community Contributor
dc.description.abstractDigital engineering approaches are increasingly used in acquisition of systems, changing the current paradigm from documentation-centric to model-centric. Not only are these systems highly vulnerable to cyber threats, so too are their enabling environment and digital assets. While good practices have emerged to support the shift to model-centric program acquisition, such programs experience perturbations over their life cycles that introduce new vulnerabilities that may lead to cascading failures. Cybersecurity vulnerabilities are of particular concern given digital transformation and increasing threat actors, making vulnerability assessment essential throughout acquisition program life cycles. This paper discusses ongoing research that seeks to provide program managers with the means to identify cybersecurity vulnerabilities within model-centric programs (along with other model-related vulnerabilities) and determine where interventions can most effectively be taken. The research builds on recent work in developing a reference model for model-centric program vulnerability assessment that uses the Cause-Effect Mapping (CEM) analytic technique. This research investigates cybersecurity specifically, using CEM and other dynamic analysis approaches, including a prototype for proactive assessment of cybersecurity and evaluation of potential interventions.
dc.description.sponsorshipAcquisition Research Program
dc.languageEnglish (United States)
dc.publisherAcquisition Research Program
dc.relation.ispartofseriesAcquisition Management
dc.relation.ispartofseriesSYM-AM-18-090
dc.subjectCause-Effect Mapping
dc.subjectCybersecurity
dc.subjectModel-Centric Acquisition
dc.subjectDigital Engineering
dc.subjectCause-Effect Mapping
dc.subjectCEM
dc.titleApplying Cause-Effect Mapping to Assess Cybersecurity Vulnerabilities in Model-Centric Acquisition Program Environments
dc.typeArticle
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File SizeFormat 
SYM-AM-18-090.pdf2.04 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.