Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/1723
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRandy William Maule
dc.date.accessioned2020-03-16T18:00:47Z-
dc.date.available2020-03-16T18:00:47Z-
dc.date.issued2019-05-13
dc.identifier.citationPublished--Unlimited Distribution
dc.identifier.urihttps://dair.nps.edu/handle/123456789/1723-
dc.descriptionAcquisition Management / Defense Acquisition Community Contributor
dc.description.abstractCurrent organizational structures have proven insufficient for cyber and information assurance. The acquisition role may be resourced and expanded to support information assurance and systems compliance. A supply chain audit and assessment process within acquisition departments will better support emerging cybersecurity requirements. This project advances technical and workflow models, an assessment framework, and implementation methods to support expansion of the acquisition department role to include cybersecurity and information assurance across the systems lifecycle from supply chain, through test and measurement, to maintenance and obsolescence. Analysis methodology and model-based system engineering techniques successfully employed in naval and joint forces field research for technology and cybersecurity evaluation for nearly two decades, along with best practices from Silicon Valley high technology industries, were applied in the acquisition cybersecurity management framework. A shift of cybersecurity assessment from distributed units into centralized acquisition departments should significantly lessen the inter- and intra-organizational boundaries which have traditionally hindered cybersecurity.
dc.description.sponsorshipAcquisition Research Program
dc.languageEnglish (United States)
dc.publisherAcquisition Research Program
dc.relation.ispartofseriesAcquisition Management
dc.relation.ispartofseriesSYM-AM-19-037
dc.subjectCybersecurity
dc.subjectManagement
dc.subjectInformation Assurance
dc.subjectSystems Compliance
dc.subjectTechnical Models
dc.subjectWorkflow Models
dc.titleAcquisition Cybersecurity Management Framework
dc.typeArticle
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File SizeFormat 
SYM-AM-19-037.pdf1.25 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.