생몰정보
소속
직위
직업
활동분야
주기
서지
국회도서관 서비스 이용에 대한 안내를 해드립니다.
검색결과 (전체 1건)
원문 있는 자료 (1) 열기
원문 아이콘이 없는 경우 국회도서관 방문 시 책자로 이용 가능
목차보기더보기
Title page
Contents
Highlights 2
Letter 6
Background 10
Weapon Systems Are Unique In Many Ways, but Face Common Cyber Vulnerabilities 10
Anatomy of a Cyber Attack 11
Attack Sequence: Discover → Implement → Exploit 13
Security Goals: Protect → Detect → Respond/Recover 13
Attack Sophistication Levels 14
DOD Weapon Systems Requirements and Acquisition Processes 14
Organizations Responsible for Weapon Systems Cybersecurity 15
Multiple Factors Make Weapon Systems Cybersecurity Increasingly Difficult, but DOD Is Just Beginning to Grapple with the Challenge 16
DOD Weapon Systems Are Increasingly Complex and Networked, Increasing Cyber Vulnerabilities 16
Despite Warnings, Cybersecurity Has Not Been a Focus of Weapon Systems Acquisitions 21
DOD Is Still Learning How to Address Weapon Systems Cybersecurity 24
Tests Revealed that Most Weapon Systems Under Development Have Major Vulnerabilities, and DOD Likely Does Not Know the Full Extent of the Problems 26
Weapon Systems Cybersecurity Assessments Identified Mission-Critical Vulnerabilities 26
DOD Has Limited Insight into Weapon Systems Cybersecurity 30
DOD Has Begun Taking Steps to Improve Weapon Systems Cybersecurity 33
DOD Has Issued and Updated Policies and Guidance 33
DOD Has Undertaken Initiatives, in Part Directed by Congress, to Help Understand and Address Weapon Systems' Cyber Vulnerabilities 36
DOD Faces Systemic Barriers to Improving Weapon Systems Cybersecurity 39
Agency Comments 42
Appendix I: Scope and Methodology 43
Appendix II: Examples of Types of Cyber Attacks 46
Appendix III: Roles and Responsibilities for Cybersecurity in the Department of Defense 47
Appendix IV: GAO Contact and Staff Acknowledgments 49
Table 1. Key Characteristics of Adversary Threat Tiers 14
Table 2. Examples of Warnings of Risks Associated with Increased Reliance on Software and Networking 21
Table 3. Timeline of Key Department of Defense (DOD) Policy and Guidance Changes to Improve Weapon Systems Cybersecurity 34
Table 4. Military Service Initiatives Focusing on Weapon Systems Cybersecurity 38
Table 5. Challenges with Sharing Information about Cyber Vulnerabilities and Threats 41
Table 6. Examples of Types of Cyber Attacks 46
Table 7. Selected Roles and Responsibilities for Cybersecurity in the Department of Defense 48
Figure 1. Key Activities in Cyber Attacks and Cyber Defense 12
Figure 2. Embedded Software and Information Technology Systems Are Pervasive in Weapon Systems (Represented via Fictitious Weapon System for Classification Reasons) 17
Figure 3. Weapons Include Numerous Interfaces That Can Be Used as Pathways to Access the System (Represented via Fictitious Weapon System for Classification Reasons) 19
Figure 4. Weapon Systems Are Connected to Networks That May Connect to Many Other Systems (Notional Depiction for Classification Reasons) 20
Figure 5. Vulnerabilities that the Department of Defense Is Aware of Likely Represent a Small Amount of Actual Vulnerabilities Due to Limitations in Cybersecurity Testing 31
원문구축 및 2018년 이후 자료는 524호에서 직접 열람하십시요.
도서위치안내: / 서가번호:
우편복사 목록담기를 완료하였습니다.
* 표시는 필수사항 입니다.
* 주의: 국회도서관 이용자 모두에게 공유서재로 서비스 됩니다.
저장 되었습니다.
로그인을 하시려면 아이디와 비밀번호를 입력해주세요. 모바일 간편 열람증으로 입실한 경우 회원가입을 해야합니다.
공용 PC이므로 한번 더 로그인 해 주시기 바랍니다.
아이디 또는 비밀번호를 확인해주세요