Show simple item record

dc.contributor.authorReid, Jack
dc.contributor.authorRhodes, Donna
dc.date04/30/18
dc.date.accessioned2018-06-12T19:22:55Z
dc.date.available2018-06-12T19:22:55Z
dc.date.issued2018-04-30
dc.identifier.urihttp://hdl.handle.net/10945/58709
dc.description.abstractDigital engineering approaches are increasingly used in acquisition of systems, changing the current paradigm from documentation-centric to model-centric. Not only are these systems highly vulnerable to cyber threats, so too are their enabling environment and digital assets. While good practices have emerged to support the shift to model-centric program acquisition, such programs experience perturbations over their life cycles that introduce new vulnerabilities that may lead to cascading failures. Cybersecurity vulnerabilities are of particular concern given digital transformation and increasing threat actors, making vulnerability assessment essential throughout acquisition program life cycles. This paper discusses ongoing research that seeks to provide program managers with the means to identify cybersecurity vulnerabilities within model-centric programs (along with other model-related vulnerabilities) and determine where interventions can most effectively be taken. The research builds on recent work in developing a reference model for model-centric program vulnerability assessment that uses the Cause-Effect Mapping (CEM) analytic technique. This research investigates cybersecurity specifically, using CEM and other dynamic analysis approaches, including a prototype for proactive assessment of cybersecurity and evaluation of potential interventions.en_US
dc.description.sponsorshipNaval Postgraduate School Acquisition Research Programen_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleApplying Cause-Effect Mapping to Assess Cybersecurity Vulnerabilities in Model-Centric Acquisition Program Environmenten_US
dc.typePresentationen_US
dc.contributor.corporateNaval Postgraduate School (U.S.)en_US
dc.contributor.corporateNaval Postgraduate School (U.S.)
dc.identifier.npsreportSYM-AM-18-175


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record