Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/5076
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZachary Levenson, Clayton Boyer-
dc.contributor.authorMary Evans, Kathleen Hyatt-
dc.contributor.authorTerry Leary, Ryan Novak-
dc.date.accessioned2024-05-23T19:57:21Z-
dc.date.available2024-05-23T19:57:21Z-
dc.date.issued2024-05-01-
dc.identifier.citationAPAen_US
dc.identifier.urihttps://dair.nps.edu/handle/123456789/5076-
dc.descriptionProceedings paperen_US
dc.description.abstractAs our adversaries look to weaken the United States, a constant barrage of social engineering attacks are hitting both the Defense Industrial Base and the Government at record numbers. Constantly, our adversaries are looking for weaknesses within our acquisition system to collect information, conduct fraud, or steal U.S. Government funded intellectual property. The report entitled “Vulnerabilities and Social Engineering in Acquisition Scenarios” is a follow-up effort to the paper presented by MITRE at the NPS Acquisition Research Symposium in May 2023, “Social Engineering Impacts on Government Acquisition.” We have developed hypothetical scenarios based on open-source reporting where our government acquisition community is uniquely vulnerable and susceptible to attacks. Each scenario aligns to a different part of the acquisition lifecycle and addresses various social engineering attack and compromise types. These scenarios highlight different government agencies and various acquisition positions (e.g., contracting officer, program staff, technical members of source selection panels, contracting specialists, etc.) to demonstrate how different mission sets and roles can all be affected by acquisition exploitation. We discuss the impact of each vulnerability attack, whether that be economic espionage or exposure of CUI. Finally, each scenario includes recommendations that can be used to help mitigate the risk, decrease the attack surface, or repel a future attack.en_US
dc.description.sponsorshipARPen_US
dc.language.isoen_USen_US
dc.publisherAcquisition Research Programen_US
dc.relation.ispartofseriesAcquisition Management;SYM-AM-24-032-
dc.subjectacquisitionen_US
dc.subjectsocial engineeringen_US
dc.subjectacquisition vulnerabilitiesen_US
dc.subjectcounterintelligenceen_US
dc.subjectsource selectionen_US
dc.subjectcontracting specialisten_US
dc.subjectprogram manageren_US
dc.subjectprocurementen_US
dc.titleVulnerabilities and Social Engineering Impacts on Government Acquisition Scenariosen_US
dc.typeTechnical Reporten_US
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File Description SizeFormat 
SYM-AM-24-032.pdf450.25 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.