版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
APPLICATIONSOF
ARTIFICIALINTELLIGENCE
(AI)FORPROTECTING
SOFTWARESUPPLYCHAINS
(SSCS)INTHEDEFENSE
INDUSTRIALBASE(DIB)
CSIAC-BCO-2023-499
SOAR
STATE-OF-THE-ARTREPORT(SOAR)
JANUARY2024
ByAbdulRahman
DISTRIBUTIONSTATEMENTA
Approvedforpublicrelease:distributionunlimited.
ContractNumber:FA8075-21-D-0001
PublishedBy:CSIAC
iii
State-of-the-ArtReport
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
SOAR
STATE-OF-THE-ARTREPORT(SOAR)
JANUARY2024
APPLICATIONSOFARTIFICIAL INTELLIGENCE(AI)FORPROTECTINGSOFTWARESUPPLYCHAINS(SSCS)INTHEDEFENSEINDUSTRIALBASE(DIB)
ABDULRAHMAN
iv
State-of-the-ArtReport
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
ABOUTCSIAC
TheCybersecurity&InformationSystemsInformationAnalysisCenter(CSIAC)isa
U.S.DepartmentofDefense(DoD)IACsponsoredbytheDefenseTechnicalInformationCenter
(DTIC).CSIACisoperatedbySURVICEEngineeringCompanyundercontractFA8075-21-D-0001andisoneofthethreenext-generationIACstransformingtheDoDIACprogram:CSIAC,DefenseSystems
InformationAnalysisCenter(DSIAC),andHomelandDefense&SecurityInformationAnalysisCenter(HDIAC).
CSIACservesastheU.S.nationalclearinghouse
forworldwidescientificandtechnicalinformationinfourtechnicalfocusareas:cybersecurity;
knowledgemanagementandinformationsharing;modelingandsimulation;andsoftwaredata
andanalysis.Assuch,CSIACcollects,analyzes,
synthesizes,anddisseminatesrelatedtechnical
informationanddataforeachofthesefocusareas.Theseeffortsfacilitateacollaborationbetween
scientistsandengineersinthecybersecurityand
informationsystemscommunitywhilepromotingimprovedproductivitybyfullyleveragingthissamecommunity’srespectiveknowledgebase.CSIAC
alsousesinformationobtainedtogeneratescientificandtechnicalproducts,includingdatabases,technologyassessments,trainingmaterials,andvarioustechnicalreports.
State-of-the-artreports(SOARs)—oneofCSIAC’s
informationproducts—providein-depthanalysisofcurrenttechnologies,evaluateandsynthesizethelatesttechnicalinformationavailable,andprovideacomprehensiveassessmentoftechnologiesrelatedtoCSIAC’stechnicalfocusareas.SpecifictopicareasareestablishedfromcollaborationwiththegreatercybersecurityandinformationsystemscommunityandvettedwithDTICtoensurethevalue-added
contributionstoWarfighterneeds.
CSIAC’smailingaddress:
CSIAC
4695MillenniumDrive
Belcamp,MD21017-1505
Telephone:(443)360-4600
v
State-of-the-ArtReport
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
REPORTDOCUMENTATIONPAGE
FormApproved
OMBNo.0704-0188
Thepublicreportingburdenforthiscollectionofinformationisestimatedtoaverage1hourperresponse,includingthetimeforreviewinginstructions,searchingexistingdatasources,gatheringandmaintainingthedataneeded,andcompletingandreviewingthecollectionofinformation.Sendcommentsregardingthisburdenestimateoranyotheraspectofthiscollectionofinformation,includingsuggestionsforreducingtheburden,toDepartmentofDefense,WashingtonHeadquartersServices,DirectorateforInformationOperationsandReports(0704-0188),1215JeffersonDavisHighway,Suite1204,Arlington,VA22202-4302.Respondentsshouldbeawarethatnotwithstandinganyotherprovisionoflaw,nopersonshallbesubjecttoanypenaltyforfailingtocomplywithacollectionofinformationifitdoesnotdisplayacurrentlyvalidOMBcontrolnumber.
PLEASEDONOTRETURNYOURFORMTOTHEABOVEADDRESS.
1.REPORTDATE
January2024
2.REPORTTYPE
State-of-the-Art
Report
3.DATESCOVERED
4.TITLEANDSUBTITLE
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
5a.CONTRACTNUMBER
FA8075-21-D-0001
5b.GRANTNUMBER
5c.PROGRAMELEMENTNUMBER
6.AUTHOR(S)
AbdulRahman
5d.PROJECTNUMBER
5e.TASKNUMBER
5f.WORKUNITNUMBER
7.PERFORMINGORGANIZATIONNAME(S)ANDADDRESS(ES)
Cybersecurity&InformationSystemsInformationAnalysisCenter(CSIAC)SURVICEEngineeringCompany
4695MillenniumDrive
Belcamp,MD21017-1505
8.PERFORMINGORGANIZATIONREPORTNUMBER
CSIAC-BCO-2023-499
9.SPONSORING/MONITORINGAGENCYNAME(S)ANDADDRESS(ES)
DefenseTechnicalInformationCenter(DTIC)
8725JohnJ.KingmanRoad
FortBelvoir,VA22060
10.SPONSOR/MONITOR’SACRONYM(S)
DTIC
11.SPONSOR/MONITOR’SREPORT
NUMBER(S)
12.DISTRIBUTION/AVAILABILITYSTATEMENT
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
13.SUPPLEMENTARYNOTES
14.ABSTRACT
Theapplicationofartificialintelligence(AI)tosoftwaresupplychains(SSCs)withinthedefenseindustrialbase(DIB)holdspromisetoimprovecybersecurityposture,ensurestrictercompliancewithNationalInstituteofStandardsandTechnology(NIST)controls,andincreaseuserconfidenceinsoftwarebuiltinpartuponmodulesandlibrariesfromoutsiderepositories.AIcanprovideanalystswithsuggestedfrequenciesfor(re)scanning,supplementthreatassessmentsofinfrastructure,automatethreatintelligenceprocessing,andexpeditecybersecurityriskmanagement.Moreover,thesecurityofSSCsintheDIBcanbenefitfromsimilarusesofAIasa
recommendationengineforcommunicatingtheprobabilityofcompromise.ForU.S.DepartmentofDefensecybersecurityanalysts,
AI-drivenautomationcanprovideinsightintohowcloselysoftwarecapabilitiesdeployedonmilitaryandgovernmentnetworksadheretoNISTcompliancestandards.Theabilitytoreflectthemostup-to-datesetofvulnerabilitieswithinasystemsecurityplancouldsignificantlyimproveupontheexistingpracticeofrelyingonmanualinternalscanning.AIcanenablehuman-in-the-loopworkflowstooptimizetheintegrationofprocessedthreatintelligenceandbetteridentifyvulnerabilitiespersoftwareand/oroperatingsystem.ThisreportpresentsanddiscusseshowAIcanprotectSSCspurpose-builtfortheDIBecosystem.
15.SUBJECTTERMS
cybersecurity,cyberattack,softwaresupplychain(SSC),coderepositories,softwarevulnerabilities,cybersecurityframework,softwarebillofmaterials,artificialintelligence,machinelearning,automation,penetrationmonitoring,defenseindustrialbase,contractorsoftware,softwarebuildsecurity,third-partyvendorsecurity
16.SECURITYCLASSIFICATIONOF:
U
17.LIMITATIONOFABSTRACT
UU
18.
NUMBEROFPAGES
48
19a.NAMEOFRESPONSIBLEPERSON
Vincent“Ted”Welsh
a.REPORT
UNCLASSIFIED
b.ABSTRACT
UNCLASSIFIED
c.THISPAGE
UNCLASSIFIED
19b.TELEPHONENUMBER(includeareacode)443-360-4600
ONTHECOVER:
(Source:Shutterstock&freepik)
StandardForm298(Rev.8/98)
PrescribedbyANSIStd.Z39.18
vi
State-of-the-ArtReport
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
THEAUTHOR
ABDULRAHMAN,PH.D.
Dr.AbdulRahmanisasubjectmatterexpertinthe
designandimplementationofcloudanalyticsand
architecturesthatsupportsituationalawareness
toolsforcybernetworkoperationsforcommercial
andgovernmentcustomers.Hehasover25years
ofinformationtechnologyexperience,including
softwaredevelopment,networkengineering,
systemsdesign,systemsarchitecture,security,
andnetworkmanagement.Hehaspublished
widelyontopicsinphysics,mathematics,and
informationtechnology.Dr.RahmanholdsDoctor
ofPhilosophydegreesinmathematicsandphysics.
vii
State-of-the-ArtReport
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
ABSTRACT
Theapplicationofartificialintelligence(AI)
tosoftwaresupplychains(SSCs)withinthe
defenseindustrialbase(DIB)holdspromiseto
improvecybersecurityposture,ensurestricter
compliancewithNationalInstituteofStandards
andTechnology(NIST)controls,andincreaseuser
confidenceinsoftwarebuiltinpartuponmodules
andlibrariesfromoutsiderepositories.AIcan
provideanalystswithsuggestedfrequenciesfor
(re)scanning,supplementthreatassessments
ofinfrastructure,automatethreatintelligence
processing,andexpeditecybersecurityrisk
management.Moreover,thesecurityofSSCsin
theDIBcanbenefitfromsimilarusesofAIasa
recommendationengineforcommunicatingthe
probabilityofcompromise.ForU.S.Department
ofDefensecybersecurityanalysts,AI-driven
automationcanprovideinsightintohowclosely
softwarecapabilitiesdeployedonmilitaryand
governmentnetworksadheretoNISTcompliance
standards.Theabilitytoreflectthemostup-to-
datesetofvulnerabilitieswithinasystemsecurity
plancouldsignificantlyimproveupontheexisting
practiceofrelyingonmanualinternalscanning.
AIcanenablehuman-in-the-loopworkflowsto
optimizetheintegrationofprocessedthreat
intelligenceandbetteridentifyvulnerabilitiesper
softwareand/oroperatingsystem.Thisreport
presentsanddiscusseshowAIcanprotectSSCs
purpose-builtfortheDIBecosystem.
viii
State-of-the-ArtReport
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
ACKNOWLEDGMENTS
Theauthorwouldliketothankthestaffofthe
Cybersecurity&InformationSystemsInformation
AnalysisCenterandSURVICEEngineering
Companyfortheirguidanceandreviewofthis
report.
ix
State-of-the-ArtReport
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
EXECUTIVESUMMARY
ManagingtheintricateanddiversesupplychainwithintheU.S.governmentinvolvesaheavy
relianceonanextensiveandvariednetworkof
suppliersandvendorsforsoftwarecomponents.Thisdependenceintroducesarangeofchallengesinensuringthesecurityofthesesoftware
components.Toaddressthesesoftwaresupplychain(SSC)securitychallengeseffectively,a
combinationoftechnicalsolutions,robustsecuritypractices,collaborationamongstakeholders,andadherencetoindustrystandardsisessential.
PrioritizingSSCsecurityiscriticalfororganizationstomitigaterisksandsafeguardagainstpotential
vulnerabilitiesandattacks.Unfortunately,
federalentitiesoftenlackcompletevisibility
intotheirSSCs,includinginformationaboutthe
origin,integrity,andsecurityofbothpacketand
precursorcomponents.Thislackofvisibilitymakesitchallengingtoidentifyandmitigaterisksand
vulnerabilities.Furthermore,relianceonthird-
partyvendorsintroducesadditionalrisksrelatedtothesecuritypracticesandintegrityofprovidedsoftwarecomponents.
TosecureSSCs,itiscrucialtoimplement
preventivestrategiesagainstattacks.Thiscanbeachievedbyestablishingasecuritybaselineand
engaginginrobustandcontinuousbehavioral
monitoringpractices.Themostsophisticated
ofthesebehavior-basedmethodsinvolvesthe
utilizationofartificialintelligence(AI)modelsto
forecast,infer,predict,correlate,andpinpointlikelyweaknesses,potentialattackvectors,andavenuesofapproachwithinSSC-embeddedsoftware.
AI-poweredsystemscancontinuouslymonitorSSCsinrealtime,identifyingsuspiciousactivitiesandflaggingactionsthatwouldotherwiseallowforunauthorizedaccess.
AImodelsareparticularlywellsuitedforthe
automationofroutineSSCsecurityauditsand
assessmentsthatareintendedtodetectpotentialvulnerabilities,risks,andsecuritycontrolgaps.
Suchaproactive,real-timeapproachenables
organizationstoaddresspotentialexploitsand
vulnerabilitiespromptlyand,ifapenetrationdoesoccur,toreceiveimmediatealertstofacilitate
swiftresponsestosecurityincidents,minimizingdamage.Moreover,theintegrationofAIwith
securitycodingworkflowscanstreamlinethe
autocompletionandupdatingofrequired
compliancepractices,therebyenhancingoverallcodequality,defectreduction,andefficiency.
State-of-the-ArtReport
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
ThisPageIntentionallyLeftBlank
xi
State-of-the-ArtReport
SECTION1
1.1
1.2
1.3
1.4
SECTION2
2.1
2.2
2.3
2.4
SECTION3
3.1
3.2
3.3
3.3.1
3.3.2
3.3.3
SECTION4
4.1
4.2
4.3
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
CONTENTS
ABOUTCSIACIV
THEAUTHORVI
ABSTRACTVII
ACKNOWLEDGMENTSVIII
EXECUTIVESUMMARYIX
INTRODUCTION1-1
DefiningSSCAttacks1-1
SSCsandtheDefenseIndustrialBase1-3
SecuringSSC1-4
ReportOverview1-4
DATAMANAGEMENTSTRATEGIES2-1
Open-SourcePackages2-1
AttackSurfaceManagementandThreatModeling2-2
ApplicationCodeSecurity2-5
NISTCybersecurityFramework2-5
FEATUREDEVELOPMENT3-1
SecureSoftwareUpdates:Development,Security,andOperations(DevSecOps);
ArtificialIntelligenceforInternetTechnolocyOperations(AIOps);andMachine
LearningOperations(MLOps)3-1
PushProtection3-2
OtherSSCFrameworks3-2
GeneralFrameworks3-3
SBOMandPipelineBillofMaterials(PBOM)3-3
SupplyChainLevelsforSoftwareArtifacts(SLSA)3-
4
APPLICATIONSOFAI4-1
AIModelsWithBlockchainIntegrationWithSSCFrameworks4-1
SoftwareVulnerabilityAnalysisandDetectionUsingAI4-3
AI-EnhancedCodingReliability4-4
xii
State-of-the-ArtReport
Figure1-1
Figure1-2
Figure2-1
Figure2-2
Figure2-3
Figure3-1
Figure3-2
Figure4-1
Table2-1
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
CONTENTS,continued
CONCLUSIONS5-1
REFERENCES6-
1
FIGURES
AnEnterprise’sVisibility,Understanding,andControlofItsSSCDecrease
WithEachLayeroftheBroaderDevelopmentCommunity’sInvolvement1-2
CybersecurityRisksThroughouttheSupplyChain1-5
AnSSCWithFocusonaSingleLink;SystemwideSecurityDependsonUpstream/
DownstreamTransparency,LinkValidity,andLogicalSeparationBetween
ComponentsandLinks2-1
DataFlowDiagramofanExampleAttackSurface2-3
TheSixMainPillarsofaSuccessfulCybersecurityProgram,asReflectedinthe
NISTCSFVersion2.0(Draft)2-6
BuildPlatformWorkflowforProvenance,asAttestationofCreatedArtifacts
inSupportofSSCSecurity3-4
SLSAApproachtoSSCThreatsandMitigations3-
5
NotionalArchitectureofBlockchainIntegratedWithAI(FL)andFramework;
FrameworksProvideArtifactLevelAlignmentforDistributedAI(FL)toBeTrained
OverAllLocations4-2
TABLES
NISTGuidanceforOrganizationalSupplyChainRiskManagementUnderthe
“Identify”FunctionoftheNISTCSFVersion1.12-7
1-1
State-of-the-ArtReport:SECTION1
INTRODUCTION
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
SECTION
01
OnceusedbytheU.S.militaryinonlyitsmost
high-techsystems,softwareisnowomnipresentacrossthedefenseestablishment.AstheDefenseInnovationBoardnotedin2019,softwaredrives
“almosteverything”thattheU.S.Departmentof
Defense(DoD)“operatesanduses,”fromdiscreteweaponssystemstotheoverarchingnetworksthatprovidecommand,control,andcommunicationscapabilitiesforcommanders[1].WhileprotectingDoDsystemsfromtraditionalcyberbasedattackswillremainanenduringchallenge,threatsto
thesecurityofthesoftwaresupplychains(SSCs)thatdevelopandproducecriticalproducts
haverecentlyriseninprominenceasapreferred
threatvectorforpenetratingandcompromising
informationsystems.Byoneestimate,thenumberofSSCattacksagainstcommercialandpublic
entitiesintheUnitedStatesincreasedbymore
than700%between2019and2023[2].SSCattackshavebecomesuchanacutethreatthatthereal-
timetrackingofSSCincidentshasbecomeanichesubsectionofthecybersecuritysolutionsmarket[3].
1.1DEFININGSSCATTACKS
Asitsnamesuggests,anSSCrefersbothtothe
processofdevelopingcode-basedpackages
acrossmultiplepartiesandtheoutcomeof
chained-developmentactivitiesintousable
softwareproducts.SSCsencompasssoftware
modules,libraries,registries,andcomponents,
aswellasallthehardware,operatingsystems,
andcloudservicesthatmaybeusedduringthecodinganddevelopmentprocess.Asoneleading
softwaredeveloperRedHathaspointedout,an
SSCismostproperlyconsideredtoincludeeven
thepeoplewhowritethecode[4].Current
softwaredevelopmentpracticesarerelativelyopen,especiallywhencomparedwithtraditionalcodingmethods,whichremainedinusewellintothe
early2000s.Insteadofsingleentitiesdevelopingsoftware—entirelyinhouseandbywritingallcodefromscratch—currentpracticesintentionallydrawuponbroadsoftwarecommunities.Developers
leveragecodesourcedfromexternal(but
interconnected)librariesandmodulesthatmay
servedifferentpurposesforanapplication(e.g.,
encryption,authentication,andnetworking)[4].
Althoughthistypeofcommunitydevelopment
deliverskeyefficienciestosoftwareproduction,
italsopresentsbadactorswithawiderangeof
potentialthreatvectors.AdmittingdependenciesthroughSSCdevelopmentcanintroduce
exploitablesoftwarecodethatisvulnerableto
numerous,andcascading,vulnerabilitiesintothepostbuiltproductcodebaseline(seeFigure1-1).
AnSSCattackmightseektoexploitopen-sourceorsharedtools,ortoillicitlyaccessasingledeveloper’sproprietarybuildinfrastructures[5].Whatever
thevector,anSSCattackconsistsofatleasttwo
elements:(1)amalignactorcompromisingatleastonesupplierwithinanSSCand(2)thatvulnerabilitythenbeingusedtoharmothersupplier(s)orthe
finalproduct/customer.WhileitispossiblethatanSSCcanbepenetratedinpartduetotheactionsofaninsider,leadingdefenseintelligenceauthoritiesliketheU.S.NationalCounterintelligenceand
1-2
State-of-the-ArtReport:SECTION1
Cybersecurity&InformationSystemsInformationAnalysisCenter
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
Figure1-1.AnEnterprise’sVisibility,Understanding,andControlofItsSSCDecreaseWithEachLayeroftheBroaderDevelopmentCommunity’sInvolvement(Source:Boyensetal.[6]).
SecurityCenterseecyberbased(orsoftware
enabled)SSCattacksasthemorecommonand,thus,greaterthreatatpresent[5].
ThedocumentedabilitytoexploitvulnerabilitiesinanSSChasexistedsinceatleastthe1980s,whenthe“KenThompsonhack”or“trustingtrustattack”demonstratedtheabilitytocompromisesource
codewhileleavingbehindalmostnotraceof
alteration[7].Sincethen,themassiveexpansionofsoftwareproductionandtheubiquitoususeofconnectedinformationsystemsacrossallsectorsoftheeconomyhavemadeSSCexploitsaprime
vectorformalignactors.Forexample,SSCattacksoftentargetpopularpackagemanagers(e.g.,nodepackagemanager[npm]forJavascriptnode.js)
andtheirusercommunities.Thesecommunitieshaveexperiencedincrediblegrowthoverthe
pastdecade—thenumberofpublicrepositorieshostedintheGitHubplatformgrewfrom46,000
inearly2009tomorethan200millionby2022[5].Accordingly,adversarialnation-states,terrorists,andothertransnationalcriminalorganizations
recognizethatSSCattackscancausewidespreadandcascadingharmfuleffects,allwhilerequiringrelativelyfewresourcestoexecute[8].
AnumberofheadlinepenetrationsinrecentyearshaveraisedtheprofileofSSCattacksformalign
actors.In2017,the“NotPetya”SSCcyberattack—themostdamagingsuchattackthentodate—infectedalineofaccountingandtaxreportingsoftwareusedbytheUkrainiangovernment
beforespreadingtoseverallargemultinational
firms.ThemalwarethatRussian-sponsored
hackersinserteddisruptedemailsystemsata
majorfoodmanufactureranddisabledmultiple
logisticssystemsforaninternationalshipping
company.Indoingso,NotPetyaevencrippled
onepharmaceuticalfirm’sabilitytosupply
1-3
State-of-the-ArtReport:SECTION1
ApplicationsofArtificialIntelligence(AI)forProtectingSoftwareSupplyChains(SSCs)intheDefenseIndustrialBase(DIB)
DISTRIBUTIONSTATEMENTA.Approvedforpublicrelease:distributionunlimited.
vaccinestotheU.S.CentersforDiseaseControl
andPrevention[9].By2020,the“SolarWinds”
cyberattack,whichoriginatedfromtheRussian
ForeignIntelligenceService,similarlypenetratedawidearrayofnetworkedsystems,primarilywithintheU.S.federalgovernment.Afterbeinginjectedwithbackdoorcode,aroutinesoftwareupdate
packageforatechnologyadministrationsuitewaswidelydownloaded;worse,thecompromisewentundetectedfornearly12months[10].
1.2SSCSANDTHEDEFENSEINDUSTRIALBASE
TheDoDacquiressoftwareproductsandsystems,professionalservices,andthesupportinghardwareandcomputingpowerneededforoperation
muchinthesamewayitobtainscratesof
5.56-mmrifleammunition—mostlypurchasing
themfromprivatefirmsandotherpublicor
nonprofitsuppliers.Generallyknownasthe
DefenseIndustrialBase(DIB),thiscollectionof
organizations,facilities,andresourcesprovides
theDoDwithhundredsofbillionsofdollarsof
productsandserviceseachyearandrepresents
thenation’senduringindustrialandeconomic
might[11].Thebroadmagnitudeandscopeof
theDoD’sacquisitionactivitiesmeansthatmorethan1millionworkersandaround60,000firms
canbeconsideredpartoftheDIB[11].Whilemanyofthesefirmsdonotdirectlyshapeorinfluence
thedevelopmentofsoftwareproductsthatentermilitarily-relevantSSCs,everysingleentity(eventhosethatonlyproducehardware,like5.56-mmcartridges)usessoftwareplatformsthatare
vulnerabletopenetration.
TheDIB’simmensescopeandwidereachinto
suppliersandsubcontractorsmakethedefenseofitsSSCsanimmensetask.Twolongstandingvulnerabilitiesfurthercomplicatethischallenge:
1.Theproductionofmicroelectronics,once
co
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 裝配式建筑施工員安全素養(yǎng)測(cè)試考核試卷含答案
- 野生動(dòng)物管護(hù)工安全演練測(cè)試考核試卷含答案
- 硬質(zhì)合金燒結(jié)工道德測(cè)試考核試卷含答案
- 卷煙封裝設(shè)備操作工操作管理測(cè)試考核試卷含答案
- 老年癡呆患者治療決策的倫理教學(xué)
- 老年疾病樣本庫(kù)的長(zhǎng)期存儲(chǔ)方案
- 住改商消防安全整治指南
- 2025四川成都市雙流區(qū)空港第四幼兒園招聘7人備考題庫(kù)及答案詳解參考
- 臨床用血申請(qǐng)管理制度
- 老年熱浪MOF的腸道微生態(tài)干預(yù)策略
- 安全管理制度培訓(xùn)課件
- 2025年12月福建廈門市鷺江創(chuàng)新實(shí)驗(yàn)室管理序列崗位招聘8人備考題庫(kù)必考題
- 2025下半年四川綿陽(yáng)市涪城區(qū)事業(yè)單位選調(diào)10人備考題庫(kù)及答案解析(奪冠系列)
- 高一生物上冊(cè)期末考試題庫(kù)含解析及答案
- 收購(gòu)商場(chǎng)協(xié)議書范本
- 承攬加工雕塑合同范本
- 中國(guó)大麻行業(yè)研究及十五五規(guī)劃分析報(bào)告
- 寒假前安全法律教育課件
- 干熱復(fù)合事件對(duì)北半球植被的影響及響應(yīng)機(jī)制研究
- 2025年四川單招護(hù)理試題及答案
- 毛巾染色知識(shí)培訓(xùn)課件
評(píng)論
0/150
提交評(píng)論