Dissertation/Thesis Abstract

Exploring cybersecurity requirements in the defense acquisition process
by Zeng, Kui, D.Sc., Capitol Technology University, 2016, 292; 10165487
Abstract (Summary)

The federal government is devoted to an open, safe, free, and dependable cyberspace that empowers innovation, enriches business, develops the economy, enhances security, fosters education, upholds democracy, and defends freedom. Despite many advantages— federal and Department of Defense cybersecurity policies and standards, the best military power equipped with the most innovative technologies in the world, and the best military and civilian workforces ready to perform any mission—the defense cyberspace is vulnerable to a variety of threats. This study explores cybersecurity requirements in the defense acquisition process. The literature review exposes cybersecurity challenges that the government faces in the federal acquisition process, and the researcher examines cybersecurity requirements in defense acquisition documents. The study reveals that cybersecurity is not at a level of importance equal to that of cost, technical, and performance in the current defense acquisition process. The study discloses the defense acquisition guidance does not reflect the change of cybersecurity requirements, and the defense acquisition processes are deficient, ineffective, and inadequate to describe and consider cybersecurity requirements, weakening the government’s overall efforts to implement cybersecurity framework into the defense acquisition system. The study recommends defense organizations elevate the importance of cybersecurity during the acquisition process, to help the government’s overall efforts to develop, build, and operate in an open, secure, interoperable, and reliable cyberspace.

Indexing (document details)
Advisor: Lagares, Maritza
Commitee:
School: Capitol Technology University
School Location: United States -- Maryland
Source: DAI-A 78/01(E), Dissertation Abstracts International
Source Type: DISSERTATION
Subjects: Business administration, Law, Information science
Keywords: Acquisition requirements, Cybersecurity, Cybersecurity consideration, Defense acquisition, Information assurance, Information security
Publication Number: 10165487
ISBN: 978-1-369-19863-8
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest