Operational cybersecurity risks and their effect on adoption of additive manufacturing in the naval domain
Grimshaw, Michael D.
MetadataShow full item record
Additive manufacturing (AM) has been proven to provide multiple benefits over traditional manufacturing methods including cost-savings, mission adaptability, and increased unit capabilities. Multiple DOD organizations are exploring and utilizing AM technology, and efforts are ongoing to determine how best to achieve large-scale adoption of AM in the United States Navy (USN). The primary concern that must be addressed is the trustworthiness of AM objects to ensure they will not increase risks to personnel, equipment, and systems. Including cybersecurity throughout the AM life cycle is a necessary component of protecting AM data and ensuring trust in AM objects to support adoption. This thesis reviews aspects of cybersecurity domain as it is applied to AM, and discusses the insights of a survey conducted with USN, United States Army (USA), and United States Air Force (USAF) resident NPS students. The goal of the survey was to contrast current understanding of adoption of technology and cybersecurity threats in AM, with the knowledge, attitudes, and opinions that prospective users have. The thesis identifies barriers to achieve large-scale adoption of AM in the naval domain with special emphasis on cybersecurity, and proposes approaches to address those barriers and support accelerated adoption of AM.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Gondree, Mark; Peterson, Zachary N. J.; Pusey, Portia (2016);The recent explosion of cybersecurity games not only reflects a growing interest in the discipline broadly, but a recognition that these types of games can be entertaining as well as useful tools for outreach and ...
Proceedings of the Twelfth Annual Acquisition Research Symposium, Thursday Sessions Volume II. Acquisition Research: Creating Synergy for Informed Change; May 13-14, 2015 Graduate School of Business & Public Policy (Monterey, California. Naval Postgraduate School, 2015-04-30); NPS-AM-15-005; NPS-AM-15-005Many people within large enterprises rely on up to four Web-based or mobile devices for their daily work routines—personal computer, tablet, and personal and work-specific smartphones. Our research is directed at identifying, ...
Communications Authentication Protocols for Unmanned Aerial Systems Running the Military Robot Operating System [video] Sandoval, Sergio (2018-04-17);Unmanned systems have been growing in prominence as platforms from which to conduct or support military operations. Operating systems built around the Robot Operating System (ROS) framework offer a number of measurable ...