Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/5206
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zachary Levenson, Clayton Boyer | - |
dc.contributor.author | Kathleen Hyatt, Mary Evans | - |
dc.contributor.author | Terry Leary, Ryan Novak | - |
dc.date.accessioned | 2024-07-22T20:49:23Z | - |
dc.date.available | 2024-07-22T20:49:23Z | - |
dc.date.issued | 2024-05-01 | - |
dc.identifier.citation | APA | en_US |
dc.identifier.uri | https://dair.nps.edu/handle/123456789/5206 | - |
dc.description | SYM Presentation | en_US |
dc.description.abstract | As our adversaries look to weaken the United States, a constant barrage of social engineering attacks are hitting both the Defense Industrial Base and the Government at record numbers. Constantly, our adversaries are looking for weaknesses within our acquisition system to collect information, conduct fraud, or steal U.S. Government funded intellectual property. The report entitled “Vulnerabilities and Social Engineering in Acquisition Scenarios” is a follow-up effort to the paper presented by MITRE at the NPS Acquisition Research Symposium in May 2023, “Social Engineering Impacts on Government Acquisition.” We have developed hypothetical scenarios based on open-source reporting where our government acquisition community is uniquely vulnerable and susceptible to attacks. Each scenario aligns to a different part of the acquisition lifecycle and addresses various social engineering attack and compromise types. These scenarios highlight different government agencies and various acquisition positions (e.g., contracting officer, program staff, technical members of source selection panels, contracting specialists, etc.) to demonstrate how different mission sets and roles can all be affected by acquisition exploitation. We discuss the impact of each vulnerability attack, whether that be economic espionage or exposure of CUI. Finally, each scenario includes recommendations that can be used to help mitigate the risk, decrease the attack surface, or repel a future attack. | en_US |
dc.description.sponsorship | ARP | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Acquisition Research Program | en_US |
dc.relation.ispartofseries | Acquisition Management;SYM-AM-24-124 | - |
dc.subject | acquisition | en_US |
dc.subject | social engineering | en_US |
dc.subject | counterintelligence | en_US |
dc.subject | source selection | en_US |
dc.subject | contracting | en_US |
dc.subject | program manager | en_US |
dc.subject | procurement | en_US |
dc.subject | COTR | en_US |
dc.title | Vulnerabilities and Social Engineering in Acquisition Scenarios | en_US |
dc.type | Presentation | en_US |
Appears in Collections: | Annual Acquisition Research Symposium Proceedings & Presentations |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SYM-AM-24-124.pdf | Presentation | 701.19 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.