Using the acquisition process to reduce the vulnerability of future systems to information warfare

Download
Author
Mullis, William S
Date
1997-03Advisor
Snider, Keith F.
Metadata
Show full item recordAbstract
Information warfare (IW) is a growing concern for the United States Army. The sophisticated, high-technology modern weapons systems upon which the U.S. Army heavily relies are increasing vulnerable to IW weapons and tactics. The acquisition process plays a major role in reducing defense systems IW vulnerability. This research identifies the primary IW threats to systems during the acquisition lifecycle and what factors in the acquisition environment contribute to IW vulnerability. This research also suggests a technique for integrating IW countermeasures into the defense systems acquisition process. A primary finding of this research is that while a Program Management Office (PMO) can institute a myriad of useful countermeasures, influencing the prime contractor to establish a secure development environment is the most important action it can take in reducing the vulnerability of future systems to IW
Collections
Related items
Showing items related by title, author, creator and subject.
-
Applying Cause-Effect Mapping to Assess Cybersecurity Vulnerabilities in Model-Centric Acquisition Program Environment
Reid, Jack; Rhodes, Donna (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-175Digital engineering approaches are increasingly used in acquisition of systems, changing the current paradigm from documentation-centric to model-centric. Not only are these systems highly vulnerable to cyber threats, so ... -
Applying Cause-Effect Mapping to Assess Cybersecurity Vulnerabilities in Model-Centric Acquisition Program Environments
Reid, Jack; Rhodes, Donna H. (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-090Digital engineering approaches are increasingly used in acquisition of systems, changing the current paradigm from documentation-centric to model-centric. Not only are these systems highly vulnerable to cyber threats, so ... -
Can naval surface forces operate under chemical weapons conditions?
Stebbins, Adriane A. (Monterey, Calif. Naval Postgraduate School, 2002-06);The acquisition and modernization of chemical warfare (CW) capabilities by state and non-state actors, coupled with the vulnerability of ships restricted in maneuverability to chemical weapons attacks, makes CW defense an ...