NPS logo Naval Postgraduate School
Dudley Knox Library
        View Item 
        •   Calhoun Home
        • Departments, Schools and Academic Groups Publications
        • Acquisition Research Program
        • Acquisition Research Symposium
        • View Item
        •   Calhoun Home
        • Departments, Schools and Academic Groups Publications
        • Acquisition Research Program
        • Acquisition Research Symposium
        • View Item
        • How to search in Calhoun
        • My Accounts
        • Ask a Librarian
        JavaScript is disabled for your browser. Some features of this site may not work without it.

        Browse

        All of CalhounCollectionsThis Collection

        My Account

        LoginRegister

        Statistics

        Most Popular ItemsStatistics by CountryMost Popular Authors

        Cybersecurity: Converting Shock into Action

        Thumbnail
        Download
        IconSYM-AM-18-177-023_Tremaine.pdf (4.204Mb)
        Download Record
        Download to EndNote/RefMan (RIS)
        Download to BibTex
        Author
        Tremaine, Robert
        Shaw, Paul
        Date
        2018
        Metadata
        Show full item record
        Abstract
        BIGBADABOOM-2. That's the name of a recent cybersecurity breach affecting 5 million stolen credit card and debit card holders (O'Brien, 2018). Unfortunately, these breaches are becoming all too common. At an alarming rate, nation states and malign actors are better equipped to conduct cyberattacks than ever. The risk is growing. Some adversaries will be able to disrupt critical infrastructure against the United States in a crisis short of war (Coates, 2018). To make matters worse, cyber threat actors are more threatening and their abilities more sophisticated. While "abilities"are just as important to defend against cyberattacks, attitudes are just as vital when it comes to the selection of the required learning strategies given their connection to necessary cybersecurity behaviors. Unfortunately, the DoD's current approach for the acquisition community won't easily fulfill the stated and implied security and resilience imperatives anytime soon unless attitudes (a critical catalyst) start to change. The learning strategies required that embody it trace back to Bloom, Krathwohl, and Harrow;all research leaders in their respective fields. Their works speak to the importance of the affective domain (i.e., the way our attitudes affect our learning behaviors). This study explores the impact of the DoD's overall implied cybersecurity learning strategy and associated actions taken to date;all intended to safeguard the efficacy of the DoD's weapon systems and supporting infrastructure. Also included is a case study discussion to demonstrate the cybersecurity actions taken by one particular organization to better prepare themselves for their assigned cybersecurity duties despite the DoD's good intentions. The learning outcome of this case study could serve as a forerunner for other DoD acquisition organizations as they consider how to implement a robust, effective and sustainable cybersecurity program. The researchers firmly believe that the DoD will be hard pressed to achieve the desired gains in security and resilience without recognizing that the critical cybersecurity behaviors and concomitant attitudes at the individual, team, and organizational levels come first. And, that might come as a shock.
        Rights
        This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
        URI
        http://hdl.handle.net/10945/58712
        NPS Report Number
        SYM-AM-18-177
        Collections
        • Acquisition Research Symposium

        Related items

        Showing items related by title, author, creator and subject.

        • Thumbnail

          Cybersecurity: Converting Shock Into Action (Part 1) 

          Shaw, Paul; Tremaine, Robert (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-092
          BIGBADABOOM-2. That's the name of a recent cybersecurity breach affecting 5 million stolen credit card and debit card holders (O'Brien, 2018). Unfortunately, these breaches are becoming all too common. At an alarming rate, ...
        • Thumbnail

          Cybersecurity: Converting Shock Into Action (Part 2) 

          Shaw, Paul; Tremaine, Robert (Monterey, California. Naval Postgraduate School, 2019); SYM-AM-19-038
          Last year, the authors presented Part 1, which focused on a discussion on policy/directives and then explored the efficacy of the DoD’s cybersecurity strategy and associated actions taken to date—all intended to safeguard ...
        • Thumbnail

          Non-Traditional Attack Surfaces to CIP and IIOT Networks [video] 

          Fansler, Aaron A.D. (Naval Postgraduate School, Monterey, California, 2018);
          Mr. Fansler presentation will discuss the use of machine learning in cyber security. Some significant steps have been made in the I.T. world but not in the O.T. world. The only advances come from the attacker’s side where ...
        Feedback

        411 Dyer Rd. Bldg. 339
        Monterey, CA 93943

         

        circdesk@nps.edu
        (831) 656-2947
        DSN 756-2947

        Start Your Research

        • Research Guides
        • How to Cite
        • Search Basics
        • Ask a Librarian
        • Library Liaisons
        • Graduate Writing Center
        • Thesis Processing Office
        • Statistics, Maps & More
        • Copyright at NPS

        Find & Download

        • Databases List
        • Articles, Books & More
        • NPS Theses
        • NPS Faculty Publications: Calhoun
        • Journal Titles
        • Course Reserves

        Use the Library

        • My Accounts
        • Request Article or Book
        • Borrow, Renew, Return
        • Remote Access
        • Workshops & Tours
        • For Faculty & Researchers
        • For International Students
        • For Alumni
        • Print, Copy, Scan, Fax
        • Rooms & Study Spaces
        • Floor Map
        • Computers & Software
        • Adapters, Lockers & More

        Collections

        • NPS Archive: Calhoun
        • Restricted Resources
        • Special Collections & Archives
        • Federal Depository
        • Homeland Security Digital Library

        About

        • Hours
        • Library Staff
        • About Us
        • Visit Us

        NPS-Licensed Resources - Terms & Conditions

        Copyright Notice

         
         

          Federal Depository Library  

        NPS Home Privacy Policy Copyright Accessibility Contact Webmaster

        Export search results

        The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

        A logged-in user can export up to 15000 items. If you're not logged in, you can export no more than 500 items.

        To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

        After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.

        Export citations

        Export the current results of the search query as a citation list. Select one of the available citation styles, or add a new one using the "Citations format" option present in the "My account" section.

        The list of citations that can be exported is limited to items.

        Export citations

        Export the current item as a citation. Select one of the available citation styles, or add a new one using the "Citations format" option present in the "My account" section.

        Export Citations