Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRandy William Maule-
dc.identifier.citationPublished--Unlimited Distribution-
dc.descriptionAcquisition Management / NPS Faculty Research-
dc.description.abstractLegacy information infrastructure has proven insufficient for cybersecurity. The acquisition role may be expanded to support information assurance. A supply chain audit and assessment process within the acquisition department will better support emerging cybersecurity requirements. This project advances technical and workflow models, an assessment framework, and implementation methods to expand the acquisition role to include cybersecurity and information assurance across the systems lifecycle from initial requisition to maintenance and obsolescence. Analysis methods and model-based system engineering techniques successfully employed in naval and joint forces field research for nearly two decades, along with best practices from Silicon Valley high technology industries, were applied in the acquisition cybersecurity management framework. A shift of cybersecurity responsibilities from distributed units into central acquisition departments should significantly lessen the inter- and intra-organizational boundaries which have hindered cybersecurity.-
dc.description.sponsorshipAcquisition Research Program-
dc.languageEnglish (United States)-
dc.publisherAcquisition Research Program-
dc.relation.ispartofseriesTechnology Transition-
dc.subjectCybersecurity Standards-
dc.subjectCyber Workflow-
dc.subjectTechnical Audit-
dc.subjectSpecification Audit-
dc.titleAcquisition Cybersecurity Management Framework-
dc.typeTechnical Report-
Appears in Collections:Sponsored Acquisition Research & Technical Reports

Files in This Item:
File SizeFormat 
NPS-AM-20-003.pdf2.56 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.