Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/1915
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSonia Kaestner
dc.contributor.authorCraig Arndt
dc.contributor.authorRobin Dillon-Merrill
dc.date.accessioned2020-03-16T18:03:02Z-
dc.date.available2020-03-16T18:03:02Z-
dc.date.issued2016-05-05
dc.identifier.citationPublished--Unlimited Distribution
dc.identifier.urihttps://dair.nps.edu/handle/123456789/1915-
dc.descriptionAcquisition Management / Defense Acquisition Community Contributor
dc.description.abstractTo improve cybersecurity, the acquisition community must understand and manage multiple dimensions of cyber-attacks both as an opportunity and as a risk that can compromise the bottom line of the organizations they work for and with. In particular, the acquisition community must understand and recognize the cyber threats inherent in procuring complex modern systems with significant cyber components. If cybersecurity is not designated as a requirement of a modern system, it is often challenging to add effective security on later, and the severity of the cyber vulnerabilities may only be identified after a breach has already occurred. If appropriate cybersecurity is designed and built-in, these systems will have higher up-front costs but potentially lower life-cycle costs because of the reduced need to fix vulnerabilities in the systems later. Additionally, individuals working in acquisition need to recognize that given the sensitive nature of their work, including intellectual property and financial data, their IT processes, information, and systems will be an attractive target for cyber threats from both criminal sources (e.g., organized crime) and nation state adversaries, and the complexity and integration of the modern supply chain will add vulnerabilities to these linked supplier systems.
dc.description.sponsorshipAcquisition Research Program
dc.languageEnglish (United States)
dc.publisherAcquisition Research Program
dc.relation.ispartofseriesInformation Technology
dc.relation.ispartofseriesSYM-AM-16-041
dc.subjectCybersecurity
dc.subjectAcquisition
dc.titleThe Cybersecurity Challenge in Acquisition
dc.typeArticle
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File SizeFormat 
SYM-AM-16-041.pdf351.31 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.