Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/1744
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDonna H. Rhodes
dc.contributor.authorJack Reid
dc.date.accessioned2020-03-16T18:00:59Z-
dc.date.available2020-03-16T18:00:59Z-
dc.date.issued2019-05-13
dc.identifier.citationPublished--Unlimited Distribution
dc.identifier.urihttps://dair.nps.edu/handle/123456789/1744-
dc.descriptionAcquisition Management / Defense Acquisition Community Contributor
dc.description.abstractDigital engineering changes how systems are acquired and developed through the use of model-centric practices and toolsets. Enterprises face new challenges in this transformation, including potential for emergent vulnerabilities within digital engineering environments. While vulnerability analysis of products and systems is standard practice, examining vulnerabilities within the enterprise itself is less common. This research is responsive to the imperatives of the newly released DoD Digital Engineering Strategy that calls for enterprises to mitigate cyber risks and secure digital engineering environments against attacks from internal and external threats, mitigate known vulnerabilities that present high risk to DoD networks and data, and to mitigate risk posed by collaboration and access to vast amount of information in models. This paper presents progress on the ongoing research that focuses on uncovering cascading vulnerabilities as related to digital engineering practice and supporting environments, with special focus on cybersecurity-related vulnerabilities. The approach uses Cause-Effect Mapping (CEM) as a mechanism for better enabling program leaders to anticipate and respond to vulnerabilities within the enterprise. The current investigation is examining enterprise-level vulnerabilities and investigating potential interventions.
dc.description.sponsorshipAcquisition Research Program
dc.languageEnglish (United States)
dc.publisherAcquisition Research Program
dc.relation.ispartofseriesAcquisition Management
dc.relation.ispartofseriesSYM-AM-19-055
dc.subjectDigital Engineering
dc.subjectModel-Centric Practices
dc.subjectEmergent Vulnerabilities
dc.subjectMitigate Cyber Risks
dc.subjectCause Effect Mapping CEM
dc.titleUncovering Cascading Vulnerabilities in Model-Centric Acquisition Programs and Enterprises
dc.typeArticle
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File SizeFormat 
SYM-AM-19-055.pdf1.48 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.