Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/4858
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kathleen Hyatt, Zachary Levenson | - |
dc.date.accessioned | 2023-05-05T03:12:05Z | - |
dc.date.available | 2023-05-05T03:12:05Z | - |
dc.date.issued | 2023-05-01 | - |
dc.identifier.citation | APA | en_US |
dc.identifier.uri | https://dair.nps.edu/handle/123456789/4858 | - |
dc.description | Proceedings Paper | en_US |
dc.description.abstract | Social engineering is the activity of attempting to manipulate users or employees to reveal sensitive data, obtain unauthorized access, or unknowingly perform fraudulent activity, and it is increasingly becoming a problem for the U.S. government Contracting and Acquisition community. Even though there are improvements in technology that make both online and offline environments safer, the human factor is still a significant vulnerability. This is especially prevalent within the Government Acquisition community, where much of the labor is not automated, and therefore relies on human actors. Sensitive information that is collected can be used as intelligence by nation state adversaries; it can enable fraudulent financial activity; and it can be deployed to interfere, influence, and disrupt sovereign national activities. Privileged access can also be leveraged—even without theft of information—as an avenue through which actors can travel to attack computer systems in kinetic ways to disrupt operations, damage equipment, or even harm personnel. The U.S. Government is not immune to this issue, losing hundreds of millions of dollars over the last decade due to social engineering attacks. This paper addresses the impacts that social engineering can specifically have on U.S. government Contracting and Acquisition organizations, such as threats to the supply chain and deepfakes. Recommendations will also be made for how agencies can both recognize and prevent social engineering attacks from occurring, thus preventing damage, disruption, compromise, and the loss of resources. | en_US |
dc.description.sponsorship | Acquisition Research Program | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Acquisition Research Program | en_US |
dc.relation.ispartofseries | Acquisition Management;SYM-AM-23-091 | - |
dc.subject | Contracting Officer | en_US |
dc.subject | Government Acquisition | en_US |
dc.subject | Social Engineering | en_US |
dc.subject | counterintelligence | en_US |
dc.subject | Humint | en_US |
dc.subject | cognitive exploitation | en_US |
dc.title | Social Engineering Impacts on Government Acquisition | en_US |
dc.type | Technical Report | en_US |
Appears in Collections: | Annual Acquisition Research Symposium Proceedings & Presentations |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SYM-AM-23-091.pdf | 715.09 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.