Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/5206
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZachary Levenson, Clayton Boyer-
dc.contributor.authorKathleen Hyatt, Mary Evans-
dc.contributor.authorTerry Leary, Ryan Novak-
dc.date.accessioned2024-07-22T20:49:23Z-
dc.date.available2024-07-22T20:49:23Z-
dc.date.issued2024-05-01-
dc.identifier.citationAPAen_US
dc.identifier.urihttps://dair.nps.edu/handle/123456789/5206-
dc.descriptionSYM Presentationen_US
dc.description.abstractAs our adversaries look to weaken the United States, a constant barrage of social engineering attacks are hitting both the Defense Industrial Base and the Government at record numbers. Constantly, our adversaries are looking for weaknesses within our acquisition system to collect information, conduct fraud, or steal U.S. Government funded intellectual property. The report entitled “Vulnerabilities and Social Engineering in Acquisition Scenarios” is a follow-up effort to the paper presented by MITRE at the NPS Acquisition Research Symposium in May 2023, “Social Engineering Impacts on Government Acquisition.” We have developed hypothetical scenarios based on open-source reporting where our government acquisition community is uniquely vulnerable and susceptible to attacks. Each scenario aligns to a different part of the acquisition lifecycle and addresses various social engineering attack and compromise types. These scenarios highlight different government agencies and various acquisition positions (e.g., contracting officer, program staff, technical members of source selection panels, contracting specialists, etc.) to demonstrate how different mission sets and roles can all be affected by acquisition exploitation. We discuss the impact of each vulnerability attack, whether that be economic espionage or exposure of CUI. Finally, each scenario includes recommendations that can be used to help mitigate the risk, decrease the attack surface, or repel a future attack.en_US
dc.description.sponsorshipARPen_US
dc.language.isoen_USen_US
dc.publisherAcquisition Research Programen_US
dc.relation.ispartofseriesAcquisition Management;SYM-AM-24-124-
dc.subjectacquisitionen_US
dc.subjectsocial engineeringen_US
dc.subjectcounterintelligenceen_US
dc.subjectsource selectionen_US
dc.subjectcontractingen_US
dc.subjectprogram manageren_US
dc.subjectprocurementen_US
dc.subjectCOTRen_US
dc.titleVulnerabilities and Social Engineering in Acquisition Scenariosen_US
dc.typePresentationen_US
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File Description SizeFormat 
SYM-AM-24-124.pdfPresentation701.19 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.