Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/1719
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Brad R. Naegle | |
dc.date.accessioned | 2020-03-16T18:00:45Z | - |
dc.date.available | 2020-03-16T18:00:45Z | - |
dc.date.issued | 2019-05-13 | |
dc.identifier.citation | Published--Unlimited Distribution | |
dc.identifier.uri | https://dair.nps.edu/handle/123456789/1719 | - |
dc.description | Acquisition Management / Defense Acquisition Community Contributor | |
dc.description.abstract | There is ample evidence that cyber-attacks and cyber warfare are a growing concern for the United States. Our warfighting systems and networks have inherent vulnerabilities and so are targets for cyber adversaries. By nature, cyber warfare is an asynchronous strategy, so the danger posed by a cyber threat is not proportional to the size of the entity initiating the attack. The United States traditional adversaries, state and non-state actors, domestic terrorists, and even individuals can pose an equally dangerous threat. The various types and astonishing number of cyber-attacks on the DoD has focused efforts to limit exposure to cyber-attacks and mitigate unavoidable vulnerabilities. The most effective way to harden systems against potential cyber-attacks is to develop the system with a cyber warfare mindset. To do this, program managers must have an in-depth understanding of their system's cyber vulnerabilities and exercise control over the design and configuration of those vulnerable subsystems. There are several challenges in both understanding and controlling a system's cyber vulnerabilities, including that the Defense Acquisition System (DAS) is designed to cede most of the design decisions to the contractor. All known and potential cyber vulnerabilities need to be treated as system Configuration Item, so that design and configuration is under government control. Fortunately, there are tools, techniques, and analyses that can augment the DAS to gain a better understanding and provide more control over the design and configuration of those subsystems presenting cyber vulnerabilities. This research analyzes the integration of these tools and the expected improvement in cyber performance resulting from the implementation. The tools include the integration of the Maintainability, Upgradeability, Interoperability, Reliability, and Safety/Security (MUIRS) analyses; Software Engineering Institute's Quality Attribute Workshop (QAW); Software Engineering Institute's Architecture Trade-off Analysis Methodologysm; and the Failure Modes and Effects Criticality Analysis (FMECA). | |
dc.description.sponsorship | Acquisition Research Program | |
dc.language | English (United States) | |
dc.publisher | Acquisition Research Program | |
dc.relation.ispartofseries | Acquisition Management | |
dc.relation.ispartofseries | SYM-AM-19-033 | |
dc.subject | Cyber Security | |
dc.subject | Cyber Attacks | |
dc.subject | Cyber Warfare | |
dc.subject | Cyber Vulnerabilities | |
dc.subject | Defense Acquisition System (Das) | |
dc.subject | MUIRS | |
dc.subject | QAW | |
dc.subject | FMECA | |
dc.title | Acquisition System Design Analysis for Improved Cyber Security Performance | |
dc.type | Article | |
Appears in Collections: | Annual Acquisition Research Symposium Proceedings & Presentations |
Files in This Item:
File | Size | Format | |
---|---|---|---|
SYM-AM-19-033.pdf | 1.14 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.