




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
APPLICATIONSOF
ARTIFICIALINTELLIGENCE
(AI)FORPROTECTING
SOFTWARESUPPLYCHAINS
(SSCS)INTHEDEFENSE
INDUSTRIALBASE(DIB)
CSIAC-BCO-2023-499
SOAR
STATE-OF-THE-ARTREPORT(SOAR)
JANUARY2024
ByAbdulRahman
DISTRIBUTIONSTATEMENTA
Approvedforpublicrelease:distributionunlimited.
ContractNumber:FA8075-21-D-0001
PublishedBy:CSIAC
iii
State-of-the-ArtReport
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
SOAR
STATE-OF-THE-ARTREPORT(SOAR)
JANUARY2024
APPLICATIONSOFARTIFICIAL INTELLIGENCE(AI)FORPROTECTINGSOFTWARESUPPLYCHAINS(SSCS)INTHEDEFENSEINDUSTRIALBASE(DIB)
ABDULRAHMAN
iv
State-of-the-ArtReport
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
ABOUTCSIAC
TheCybersecurity&InformationSystemsInformationAnalysisCenter(CSIAC)isa
U.S.DepartmentofDefense(DoD)IACsponsoredbytheDefenseTechnicalInformationCenter
(DTIC).CSIACisoperatedbySURVICEEngineeringCompanyundercontractFA8075-21-D-0001andisoneofthethreenext-generationIACstransformingtheDoDIACprogram:CSIAC,DefenseSystems
InformationAnalysisCenter(DSIAC),andHomelandDefense&SecurityInformationAnalysisCenter(HDIAC).
CSIACservesastheU.S.nationalclearinghouse
forworldwidescientificandtechnicalinformationinfourtechnicalfocusareas:cybersecurity;
knowledgemanagementandinformationsharing;modelingandsimulation;andsoftwaredata
andanalysis.Assuch,CSIACcollects,analyzes,
synthesizes,anddisseminatesrelatedtechnical
informationanddataforeachofthesefocusareas.Theseeffortsfacilitateacollaborationbetween
scientistsandengineersinthecybersecurityand
informationsystemscommunitywhilepromotingimprovedproductivitybyfullyleveragingthissamecommunity’srespectiveknowledgebase.CSIAC
alsousesinformationobtainedtogeneratescientificandtechnicalproducts,includingdatabases,technologyassessments,trainingmaterials,andvarioustechnicalreports.
State-of-the-artreports(SOARs)—oneofCSIAC’s
informationproducts—providein-depthanalysisofcurrenttechnologies,evaluateandsynthesizethelatesttechnicalinformationavailable,andprovideacomprehensiveassessmentoftechnologiesrelatedtoCSIAC’stechnicalfocusareas.SpecifictopicareasareestablishedfromcollaborationwiththegreatercybersecurityandinformationsystemscommunityandvettedwithDTICtoensurethevalue-added
contributionstoWarfighterneeds.
CSIAC’smailingaddress:
CSIAC
4695MillenniumDrive
Belcamp,MD21017-1505
Telephone:(443)360-4600
v
State-of-the-ArtReport
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
REPORTDOCUMENTATIONPAGE
FormApproved
OMBNo.0704-0188
Thepublicreportingburdenforthiscollectionofinformationisestimatedtoaverage1hourperresponse,includingthetimeforreviewinginstructions,searchingexistingdatasources,gatheringandmaintainingthedataneeded,andcompletingandreviewingthecollectionofinformation.Sendcommentsregardingthisburdenestimateoranyotheraspectofthiscollectionofinformation,includingsuggestionsforreducingtheburden,toDepartmentofDefense,WashingtonHeadquartersServices,DirectorateforInformationOperationsandReports(0704-0188),1215JeffersonDavisHighway,Suite1204,Arlington,VA22202-4302.Respondentsshouldbeawarethatnotwithstandinganyotherprovisionoflaw,nopersonshallbesubjecttoanypenaltyforfailingtocomplywithacollectionofinformationifitdoesnotdisplayacurrentlyvalidOMBcontrolnumber.
PLEASEDONOTRETURNYOURFORMTOTHEABOVEADDRESS.
1.REPORTDATE
January2024
2.REPORTTYPE
State-of-the-Art
Report
3.DATESCOVERED
4.TITLEANDSUBTITLE
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
5a.CONTRACTNUMBER
FA8075-21-D-0001
5b.GRANTNUMBER
5c.PROGRAMELEMENTNUMBER
6.AUTHOR(S)
AbdulRahman
5d.PROJECTNUMBER
5e.TASKNUMBER
5f.WORKUNITNUMBER
7.PERFORMINGORGANIZATIONNAME(S)ANDADDRESS(ES)
Cybersecurity&InformationSystemsInformationAnalysisCenter(CSIAC)SURVICEEngineeringCompany
4695MillenniumDrive
Belcamp,MD21017-1505
8.PERFORMINGORGANIZATIONREPORTNUMBER
CSIAC-BCO-2023-499
9.SPONSORING/MONITORINGAGENCYNAME(S)ANDADDRESS(ES)
DefenseTechnicalInformationCenter(DTIC)
8725JohnJ.KingmanRoad
FortBelvoir,VA22060
10.SPONSOR/MONITOR’SACRONYM(S)
DTIC
11.SPONSOR/MONITOR’SREPORT
NUMBER(S)
12.DISTRIBUTION/AVAILABILITYSTATEMENT
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
13.SUPPLEMENTARYNOTES
14.ABSTRACT
Theapplicationofartificialintelligence(AI)tosoftwaresupplychains(SSCs)withinthedefenseindustrialbase(DIB)holdspromisetoimprovecybersecurityposture,ensurestrictercompliancewithNationalInstituteofStandardsandTechnology(NIST)controls,andincreaseuserconfidenceinsoftwarebuiltinpartuponmodulesandlibrariesfromoutsiderepositories.AIcanprovideanalystswithsuggestedfrequenciesfor(re)scanning,supplementthreatassessmentsofinfrastructure,automatethreatintelligenceprocessing,andexpeditecybersecurityriskmanagement.Moreover,thesecurityofSSCsintheDIBcanbenefitfromsimilarusesofAIasa
recommendationengineforcommunicatingtheprobabilityofcompromise.ForU.S.DepartmentofDefensecybersecurityanalysts,
AI-drivenautomationcanprovideinsightintohowcloselysoftwarecapabilitiesdeployedonmilitaryandgovernmentnetworksadheretoNISTcompliancestandards.Theabilitytoreflectthemostup-to-datesetofvulnerabilitieswithinasystemsecurityplancouldsignificantlyimproveupontheexistingpracticeofrelyingonmanualinternalscanning.AIcanenablehuman-in-the-loopworkflowstooptimizetheintegrationofprocessedthreatintelligenceandbetteridentifyvulnerabilitiespersoftwareand/oroperatingsystem.ThisreportpresentsanddiscusseshowAIcanprotectSSCspurpose-builtfortheDIBecosystem.
15.SUBJECTTERMS
cybersecurity,cyberattack,softwaresupplychain(SSC),coderepositories,softwarevulnerabilities,cybersecurityframework,softwarebillofmaterials,artificialintelligence,machinelearning,automation,penetrationmonitoring,defenseindustrialbase,contractorsoftware,softwarebuildsecurity,third-partyvendorsecurity
16.SECURITYCLASSIFICATIONOF:
U
17.LIMITATIONOFABSTRACT
UU
18.
NUMBEROFPAGES
48
19a.NAMEOFRESPONSIBLEPERSON
Vincent“Ted”Welsh
a.REPORT
UNCLASSIFIED
b.ABSTRACT
UNCLASSIFIED
c.THISPAGE
UNCLASSIFIED
19b.TELEPHONENUMBER(includeareacode)443-360-4600
ONTHECOVER:
(Source:Shutterstock&freepik)
StandardForm298(Rev.8/98)
PrescribedbyANSIStd.Z39.18
vi
State-of-the-ArtReport
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
THEAUTHOR
ABDULRAHMAN,PH.D.
Dr.AbdulRahmanisasubjectmatterexpertinthe
designandimplementationofcloudanalyticsand
architecturesthatsupportsituationalawareness
toolsforcybernetworkoperationsforcommercial
andgovernmentcustomers.Hehasover25years
ofinformationtechnologyexperience,including
softwaredevelopment,networkengineering,
systemsdesign,systemsarchitecture,security,
andnetworkmanagement.Hehaspublished
widelyontopicsinphysics,mathematics,and
informationtechnology.Dr.RahmanholdsDoctor
ofPhilosophydegreesinmathematicsandphysics.
vii
State-of-the-ArtReport
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
ABSTRACT
Theapplicationofartificialintelligence(AI)
tosoftwaresupplychains(SSCs)withinthe
defenseindustrialbase(DIB)holdspromiseto
improvecybersecurityposture,ensurestricter
compliancewithNationalInstituteofStandards
andTechnology(NIST)controls,andincreaseuser
confidenceinsoftwarebuiltinpartuponmodules
andlibrariesfromoutsiderepositories.AIcan
provideanalystswithsuggestedfrequenciesfor
(re)scanning,supplementthreatassessments
ofinfrastructure,automatethreatintelligence
processing,andexpeditecybersecurityrisk
management.Moreover,thesecurityofSSCsin
theDIBcanbenefitfromsimilarusesofAIasa
recommendationengineforcommunicatingthe
probabilityofcompromise.ForU.S.Department
ofDefensecybersecurityanalysts,AI-driven
automationcanprovideinsightintohowclosely
softwarecapabilitiesdeployedonmilitaryand
governmentnetworksadheretoNISTcompliance
standards.Theabilitytoreflectthemostup-to-
datesetofvulnerabilitieswithinasystemsecurity
plancouldsignificantlyimproveupontheexisting
practiceofrelyingonmanualinternalscanning.
AIcanenablehuman-in-the-loopworkflowsto
optimizetheintegrationofprocessedthreat
intelligenceandbetteridentifyvulnerabilitiesper
softwareand/oroperatingsystem.Thisreport
presentsanddiscusseshowAIcanprotectSSCs
purpose-builtfortheDIBecosystem.
viii
State-of-the-ArtReport
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
ACKNOWLEDGMENTS
Theauthorwouldliketothankthestaffofthe
Cybersecurity&InformationSystemsInformation
AnalysisCenterandSURVICEEngineering
Companyfortheirguidanceandreviewofthis
report.
ix
State-of-the-ArtReport
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
EXECUTIVESUMMARY
ManagingtheintricateanddiversesupplychainwithintheU.S.governmentinvolvesaheavy
relianceonanextensiveandvariednetworkof
suppliersandvendorsforsoftwarecomponents.Thisdependenceintroducesarangeofchallengesinensuringthesecurityofthesesoftware
components.Toaddressthesesoftwaresupplychain(SSC)securitychallengeseffectively,a
combinationoftechnicalsolutions,robustsecuritypractices,collaborationamongstakeholders,andadherencetoindustrystandardsisessential.
PrioritizingSSCsecurityiscriticalfororganizationstomitigaterisksandsafeguardagainstpotential
vulnerabilitiesandattacks.Unfortunately,
federalentitiesoftenlackcompletevisibility
intotheirSSCs,includinginformationaboutthe
origin,integrity,andsecurityofbothpacketand
precursorcomponents.Thislackofvisibilitymakesitchallengingtoidentifyandmitigaterisksand
vulnerabilities.Furthermore,relianceonthird-
partyvendorsintroducesadditionalrisksrelatedtothesecuritypracticesandintegrityofprovidedsoftwarecomponents.
TosecureSSCs,itiscrucialtoimplement
preventivestrategiesagainstattacks.Thiscanbeachievedbyestablishingasecuritybaselineand
engaginginrobustandcontinuousbehavioral
monitoringpractices.Themostsophisticated
ofthesebehavior-basedmethodsinvolvesthe
utilizationofartificialintelligence(AI)modelsto
forecast,infer,predict,correlate,andpinpointlikelyweaknesses,potentialattackvectors,andavenuesofapproachwithinSSC-embeddedsoftware.
AI-poweredsystemscancontinuouslymonitorSSCsinrealtime,identifyingsuspiciousactivitiesandflaggingactionsthatwouldotherwiseallowforunauthorizedaccess.
AImodelsareparticularlywellsuitedforthe
automationofroutineSSCsecurityauditsand
assessmentsthatareintendedtodetectpotentialvulnerabilities,risks,andsecuritycontrolgaps.
Suchaproactive,real-timeapproachenables
organizationstoaddresspotentialexploitsand
vulnerabilitiespromptlyand,ifapenetrationdoesoccur,toreceiveimmediatealertstofacilitate
swiftresponsestosecurityincidents,minimizingdamage.Moreover,theintegrationofAIwith
securitycodingworkflowscanstreamlinethe
autocompletionandupdatingofrequired
compliancepractices,therebyenhancingoverallcodequality,defectreduction,andefficiency.
State-of-the-ArtReport
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
ThisPageIntentionallyLeftBlank
xi
State-of-the-ArtReport
SECTION1
1.1
1.2
1.3
1.4
SECTION2
2.1
2.2
2.3
2.4
SECTION3
3.1
3.2
3.3
3.3.1
3.3.2
3.3.3
SECTION4
4.1
4.2
4.3
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
CONTENTS
ABOUTCSIACIV
THEAUTHORVI
ABSTRACTVII
ACKNOWLEDGMENTSVIII
EXECUTIVESUMMARYIX
INTRODUCTION1-1
DefiningSSCAttacks1-1
SSCsandtheDefenseIndustrialBase1-3
SecuringSSC1-4
ReportOverview1-4
DATAMANAGEMENTSTRATEGIES2-1
Open-SourcePackages2-1
AttackSurfaceManagementandThreatModeling2-2
ApplicationCodeSecurity2-5
NISTCybersecurityFramework2-5
FEATUREDEVELOPMENT3-1
SecureSoftwareUpdates:Development,Security,andOperations(DevSecOps);
ArtificialIntelligenceforInternetTechnolocyOperations(AIOps);andMachine
LearningOperations(MLOps)3-1
PushProtection3-2
OtherSSCFrameworks3-2
GeneralFrameworks3-3
SBOMandPipelineBillofMaterials(PBOM)3-3
SupplyChainLevelsforSoftwareArtifacts(SLSA)3-
4
APPLICATIONSOFAI4-1
AIModelsWithBlockchainIntegrationWithSSCFrameworks4-1
SoftwareVulnerabilityAnalysisandDetectionUsingAI4-3
AI-EnhancedCodingReliability4-4
xii
State-of-the-ArtReport
Figure1-1
Figure1-2
Figure2-1
Figure2-2
Figure2-3
Figure3-1
Figure3-2
Figure4-1
Table2-1
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
CONTENTS,continued
CONCLUSIONS5-1
REFERENCES6-
1
FIGURES
AnEnterprise’sVisibility,Understanding,andControlofItsSSCDecrease
WithEachLayeroftheBroaderDevelopmentCommunity’sInvolvement1-2
CybersecurityRisksThroughouttheSupplyChain1-5
AnSSCWithFocusonaSingleLink;SystemwideSecurityDependsonUpstream/
DownstreamTransparency,LinkValidity,andLogicalSeparationBetween
ComponentsandLinks2-1
DataFlowDiagramofanExampleAttackSurface2-3
TheSixMainPillarsofaSuccessfulCybersecurityProgram,asReflectedinthe
NISTCSFVersion2.0(Draft)2-6
BuildPlatformWorkflowforProvenance,asAttestationofCreatedArtifacts
inSupportofSSCSecurity3-4
SLSAApproachtoSSCThreatsandMitigations3-
5
NotionalArchitectureofBlockchainIntegratedWithAI(FL)andFramework;
FrameworksProvideArtifactLevelAlignmentforDistributedAI(FL)toBeTrained
OverAllLocations4-2
TABLES
NISTGuidanceforOrganizationalSupplyChainRiskManagementUnderthe
“Identify”FunctionoftheNISTCSFVersion1.12-7
1-1
State-of-the-ArtReport:SECTION1
INTRODUCTION
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
SECTION
01
OnceusedbytheU.S.militaryinonlyitsmost
high-techsystems,softwareisnowomnipresentacrossthedefenseestablishment.AstheDefenseInnovationBoardnotedin2019,softwaredrives
“almosteverything”thattheU.S.Departmentof
Defense(DoD)“operatesanduses,”fromdiscreteweaponssystemstotheoverarchingnetworksthatprovidecommand,control,andcommunicationscapabilitiesforcommanders[1].WhileprotectingDoDsystemsfromtraditionalcyberbasedattackswillremainanenduringchallenge,threatsto
thesecurityofthesoftwaresupplychains(SSCs)thatdevelopandproducecriticalproducts
haverecentlyriseninprominenceasapreferred
threatvectorforpenetratingandcompromising
informationsystems.Byoneestimate,thenumberofSSCattacksagainstcommercialandpublic
entitiesintheUnitedStatesincreasedbymore
than700%between2019and2023[2].SSCattackshavebecomesuchanacutethreatthatthereal-
timetrackingofSSCincidentshasbecomeanichesubsectionofthecybersecuritysolutionsmarket[3].
1.1DEFININGSSCATTACKS
Asitsnamesuggests,anSSCrefersbothtothe
processofdevelopingcode-basedpackages
acrossmultiplepartiesandtheoutcomeof
chained-developmentactivitiesintousable
softwareproducts.SSCsencompasssoftware
modules,libraries,registries,andcomponents,
aswellasallthehardware,operatingsystems,
andcloudservicesthatmaybeusedduringthecodinganddevelopmentprocess.Asoneleading
softwaredeveloperRedHathaspointedout,an
SSCismostproperlyconsideredtoincludeeven
thepeoplewhowritethecode[4].Current
softwaredevelopmentpracticesarerelativelyopen,especiallywhencomparedwithtraditionalcodingmethods,whichremainedinusewellintothe
early2000s.Insteadofsingleentitiesdevelopingsoftware—entirelyinhouseandbywritingallcodefromscratch—currentpracticesintentionallydrawuponbroadsoftwarecommunities.Developers
leveragecodesourcedfromexternal(but
interconnected)librariesandmodulesthatmay
servedifferentpurposesforanapplication(e.g.,
encryption,authentication,andnetworking)[4].
Althoughthistypeofcommunitydevelopment
deliverskeyefficienciestosoftwareproduction,
italsopresentsbadactorswithawiderangeof
potentialthreatvectors.AdmittingdependenciesthroughSSCdevelopmentcanintroduce
exploitablesoftwarecodethatisvulnerableto
numerous,andcascading,vulnerabilitiesintothepostbuiltproductcodebaseline(seeFigure1-1).
AnSSCattackmightseektoexploitopen-sourceorsharedtools,ortoillicitlyaccessasingledeveloper’sproprietarybuildinfrastructures[5].Whatever
thevector,anSSCattackconsistsofatleasttwo
elements:(1)amalignactorcompromisingatleastonesupplierwithinanSSCand(2)thatvulnerabilitythenbeingusedtoharmothersupplier(s)orthe
finalproduct/customer.WhileitispossiblethatanSSCcanbepenetratedinpartduetotheactionsofaninsider,leadingdefenseintelligenceauthoritiesliketheU.S.NationalCounterintelligenceand
1-2
State-of-the-ArtReport:SECTION1
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
Figure1-1.AnEnterprise’sVisibility,Understanding,andControlofItsSSCDecreaseWithEachLayeroftheBroaderDevelopmentCommunity’sInvolvement(Source:Boyensetal.[6]).
SecurityCenterseecyberbased(orsoftware
enabled)SSCattacksasthemorecommonand,thus,greaterthreatatpresent[5].
ThedocumentedabilitytoexploitvulnerabilitiesinanSSChasexistedsinceatleastthe1980s,whenthe“KenThompsonhack”or“trustingtrustattack”demonstratedtheabilitytocompromisesource
codewhileleavingbehindalmostnotraceof
alteration[7].Sincethen,themassiveexpansionofsoftwareproductionandtheubiquitoususeofconnectedinformationsystemsacrossallsectorsoftheeconomyhavemadeSSCexploitsaprime
vectorformalignactors.Forexample,SSCattacksoftentargetpopularpackagemanagers(e.g.,nodepackagemanager[npm]forJavascriptnode.js)
andtheirusercommunities.Thesecommunitieshaveexperiencedincrediblegrowthoverthe
pastdecade—thenumberofpublicrepositorieshostedintheGitHubplatformgrewfrom46,000
inearly2009tomorethan200millionby2022[5].Accordingly,adversarialnation-states,terrorists,andothertransnationalcriminalorganizations
recognizethatSSCattackscancausewidespreadandcascadingharmfuleffects,allwhilerequiringrelativelyfewresourcestoexecute[8].
AnumberofheadlinepenetrationsinrecentyearshaveraisedtheprofileofSSCattacksformalign
actors.In2017,the“NotPetya”SSCcyberattack—themostdamagingsuchattackthentodate—infectedalineofaccountingandtaxreportingsoftwareusedbytheUkrainiangovernment
beforespreadingtoseverallargemultinational
firms.ThemalwarethatRussian-sponsored
hackersinserteddisruptedemailsystemsata
majorfoodmanufactureranddisabledmultiple
logisticssystemsforaninternationalshipping
company.Indoingso,NotPetyaevencrippled
onepharmaceuticalfirm’sabilitytosupply
1-3
State-of-the-ArtReport:SECTION1
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
vaccinestotheU.S.CentersforDiseaseControl
andPrevention[9].By2020,the“SolarWinds”
cyberattack,whichoriginatedfromtheRussian
ForeignIntelligenceService,similarlypenetratedawidearrayofnetworkedsystems,primarilywithintheU.S.federalgovernment.Afterbeinginjectedwithbackdoorcode,aroutinesoftwareupdate
packageforatechnologyadministrationsuitewaswidelydownloaded;worse,thecompromisewentundetectedfornearly12months[10].
1.2SSCSANDTHEDEFENSEINDUSTRIALBASE
TheDoDacquiressoftwareproductsandsystems,professionalservices,andthesupportinghardwareandcomputingpowerneededforoperation
muchinthesamewayitobtainscratesof
5.56-mmrifleammunition—mostlypurchasing
themfromprivatefirmsandotherpublicor
nonprofitsuppliers.Generallyknownasthe
DefenseIndustrialBase(DIB),thiscollectionof
organizations,facilities,andresourcesprovides
theDoDwithhundredsofbillionsofdollarsof
productsandserviceseachyearandrepresents
thenation’senduringindustrialandeconomic
might[11].Thebroadmagnitudeandscopeof
theDoD’sacquisitionactivitiesmeansthatmorethan1millionworkersandaround60,000firms
canbeconsideredpartoftheDIB[11].Whilemanyofthesefirmsdonotdirectlyshapeorinfluence
thedevelopmentofsoftwareproductsthatentermilitarily-relevantSSCs,everysingleentity(eventhosethatonlyproducehardware,like5.56-mmcartridges)usessoftwareplatformsthatare
vulnerabletopenetration.
TheDIB’simmensescopeandwidereachinto
suppliersandsubcontractorsmakethedefenseofitsSSCsanimmensetask.Twolongstandingvulnerabilitiesfurthercomplicatethischallenge:
1.Theproductionofmicroelectronics,once
co
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 印刷企業(yè)市場(chǎng)調(diào)研方法考核試卷
- 家庭裝飾畫框批發(fā)考核試卷
- 園藝陶瓷的公共空間裝飾效果考核試卷
- 印刷設(shè)備生產(chǎn)過程的智能化技術(shù)應(yīng)用案例考核試卷
- 圖書出租業(yè)務(wù)的服務(wù)標(biāo)準(zhǔn)化培訓(xùn)考核試卷
- 影視錄放設(shè)備的智能鏡頭切換考核試卷
- 暖氣施工合同范本
- 簽訂重大銷售合同范本
- 口腔消毒培訓(xùn)課件
- 電商行業(yè)產(chǎn)品描述免責(zé)協(xié)議承諾書
- EPC項(xiàng)目采購管理方案
- 旅游景區(qū)旅游安全風(fēng)險(xiǎn)評(píng)估報(bào)告
- 門窗安裝工程投標(biāo)書范本(二)
- 追覓科技在線測(cè)評(píng)題
- 智鼎在線測(cè)評(píng)107題
- 病歷書寫規(guī)范與住院病歷質(zhì)量監(jiān)控管理制度
- 12詩詞四首《漁家傲-秋思》公開課一等獎(jiǎng)創(chuàng)新教學(xué)設(shè)計(jì) 初中語文九年級(jí)下冊(cè)
- 金礦承包協(xié)議合同2024年
- 解讀國有企業(yè)管理人員處分條例(2024)課件(全文)
- 創(chuàng)新創(chuàng)業(yè)基礎(chǔ)-理論、案例與訓(xùn)練(大學(xué)生創(chuàng)新創(chuàng)業(yè)教育課程)全套教學(xué)課件
- TD/T 1072-2022 國土調(diào)查坡度分級(jí)圖制作技術(shù)規(guī)定(正式版)
評(píng)論
0/150
提交評(píng)論