Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/1744
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Donna H. Rhodes | |
dc.contributor.author | Jack Reid | |
dc.date.accessioned | 2020-03-16T18:00:59Z | - |
dc.date.available | 2020-03-16T18:00:59Z | - |
dc.date.issued | 2019-05-13 | |
dc.identifier.citation | Published--Unlimited Distribution | |
dc.identifier.uri | https://dair.nps.edu/handle/123456789/1744 | - |
dc.description | Acquisition Management / Defense Acquisition Community Contributor | |
dc.description.abstract | Digital engineering changes how systems are acquired and developed through the use of model-centric practices and toolsets. Enterprises face new challenges in this transformation, including potential for emergent vulnerabilities within digital engineering environments. While vulnerability analysis of products and systems is standard practice, examining vulnerabilities within the enterprise itself is less common. This research is responsive to the imperatives of the newly released DoD Digital Engineering Strategy that calls for enterprises to mitigate cyber risks and secure digital engineering environments against attacks from internal and external threats, mitigate known vulnerabilities that present high risk to DoD networks and data, and to mitigate risk posed by collaboration and access to vast amount of information in models. This paper presents progress on the ongoing research that focuses on uncovering cascading vulnerabilities as related to digital engineering practice and supporting environments, with special focus on cybersecurity-related vulnerabilities. The approach uses Cause-Effect Mapping (CEM) as a mechanism for better enabling program leaders to anticipate and respond to vulnerabilities within the enterprise. The current investigation is examining enterprise-level vulnerabilities and investigating potential interventions. | |
dc.description.sponsorship | Acquisition Research Program | |
dc.language | English (United States) | |
dc.publisher | Acquisition Research Program | |
dc.relation.ispartofseries | Acquisition Management | |
dc.relation.ispartofseries | SYM-AM-19-055 | |
dc.subject | Digital Engineering | |
dc.subject | Model-Centric Practices | |
dc.subject | Emergent Vulnerabilities | |
dc.subject | Mitigate Cyber Risks | |
dc.subject | Cause Effect Mapping CEM | |
dc.title | Uncovering Cascading Vulnerabilities in Model-Centric Acquisition Programs and Enterprises | |
dc.type | Article | |
Appears in Collections: | Annual Acquisition Research Symposium Proceedings & Presentations |
Files in This Item:
File | Size | Format | |
---|---|---|---|
SYM-AM-19-055.pdf | 1.48 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.