Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains

被引:3
作者
Sobb, Theresa May [1 ]
Turnbull, Benjamin [2 ]
机构
[1] Univ New South Wales, Sch Engn & Informat Technol, Canberra, ACT, Australia
[2] Univ New South Wales, UNSW Canberra Cyber, Canberra, ACT, Australia
来源
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020) | 2020年
关键词
supply chain; cyber-security.framework; military; cyber; Systems-of-systems; SYSTEM; MAINTENANCE; MANAGEMENT;
D O I
10.1109/SPW50608.2020.00038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Military supply chains play a critical role in the acquisition and movement of goods for defence purposes. The disruption of these supply chain processes can have potentially devastating affects to the operational capability of military forces. The introduction and integration of new technologies into defence supply chains can serve to increase their effectiveness. However, the benefits posed by these technologies may be outweighed by significant consequences to the cyber security of the entire defence supply chain. Supply chains are complex Systems of Systems, and the introduction of an insecure technology into such a complex ecosystem may induce cascading system-wide failure, and have catastrophic consequences to military mission assurance. Subsequently, there is a need for an evaluative process to determine the extent to which a new technology will affect the cyber security of military supply chains. This work proposes a new model, the Military Supply Chain Cyber Implications Model (M-SCCIM), that serves to aid military decision makers in understanding the potential cyber security impact of introducing new technologies to supply chains. M-SCCIM is a multiphase model that enables understanding of cyber security and supply chain implications through the lenses of theoretical examinations, pilot applications and system wide implementations.
引用
收藏
页码:128 / 135
页数:8
相关论文
共 47 条
[1]  
Alharby M., 2017, 11 INT C COMPUTER SC, P125, DOI https://doi.org/10.5121/csit.2017.71011
[2]  
[Anonymous], 2019, TELEGRAPH
[3]  
[Anonymous], 2016, ACSC THREAT REPORT
[4]  
[Anonymous], 2005, TASK FORCE HIGH PERF
[5]  
[Anonymous], 2017, STRATEGIES INCIDENT
[6]  
[Anonymous], 2016, The Economist
[7]  
Antonopoulos A. M., 2019, Mastering Ethereum: Building Smart Contracts and DApps, V1st ed.
[8]  
Bartol N., 2014, INFORM COMMUNICATION
[9]  
Bayuk J., 2012, Cyber Security Policy Guidebook
[10]   A reliability-centered asset maintenance method for assessing the impact of maintenance in power distribution systems [J].
Bertling, L ;
Allan, R ;
Eriksson, R .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2005, 20 (01) :75-82