Skip to main content

Acquisition Management

  • Chapter
  • First Online:
The NICE Cyber Security Framework
  • 1445 Accesses

Abstract

The process of acquiring computing resources includes several activities related to planning, budgeting, comparing alternative options, configuration and change management, etc. Our focus in this book is on securing information and computing resources. As such, selected KSAs as well as the content of each KSA will be focused on this subject only.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  • (CSD), NIST Computer Security Division (2010) NISTIR 7622 draft, piloting supply chain risk management practices for federal information systems (DRAFT), pp 1–78

    Google Scholar 

  • Acq.osd.mil (2011) Program protection plan outline & guidance, Ver. 1.0. Deputy Assistant Secretary of Defense, Systems Engineering. https://www.acq.osd.mil/se/initiatives/init_pp-sse.html

  • Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Ali Al-Qudah M, Al-Omari A (2018) Security and access controls: lesson plans. In: Practical information security. Springer, Cham

    Chapter  Google Scholar 

  • Alves P, Campos P, Oliveira E (2012a) Modeling the trustworthiness of a supplier agent in a B2B relationship. In: Camarinha-Matos LM, Xu L, Afsarmanesh H (eds) Collaborative networks in the internet of services. PRO-VE 2012. IFIP advances in information and communication technology, vol 380. Springer, Berlin

    Google Scholar 

  • Alves P, Campos P, Oliveira E (2012b) Modeling the trustworthiness of a supplier agent in a B2B relationship, PRO-VE 2012. International Federation for Information Processing IFIP AICT 380, pp 675–686

    Google Scholar 

  • Blos MF, Quaddus M, Wee HM, Watanabe K (2009) Supply chain risk management (SCRM): a case study on the automotive and electronic industries in Brazil. Supply Chain Manag 14(4):247–252

    Article  Google Scholar 

  • Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply chain risk management practices for federal information systems and organizations. https://doi.org/10.6028/nist.sp.800-161

  • Defense Acquisition University Press (2001) System engineering fundamentals. http://acqnotes.com

  • Department of Homeland Security Cyber Security Division (2007) Software assurance in acquisition: mitigating risks to the enterprise, Draft Version 1.0

    Google Scholar 

  • DHS (2008) Acquisition instruction/guidebook, 102-01-001, INTERIM, Version 1.9

    Google Scholar 

  • DOE (2018) DOE G 430.1-1 Chp 23, life cycle cost estimate. https://www.directives.doe.gov/directives-documents/400-series/0430.1-EGuide-1-Chp23

  • Grady JO (2006) System requirements analysis. Academic, Cambridge

    Book  Google Scholar 

  • Hutton JP (2010) United States Government Accountability Office, Deepwater requirements, quantities, and cost require revalidation to reflect knowledge gained, GAO-10-790, https://www.gao.gov/assets/310/307742.html

    Google Scholar 

  • Ivancic WD, Vaden KR, Jones RE, Roberts AM (2015) Operational concepts for a generic space exploration communication network architecture, Technical report, NASA Glenn Research Center

    Google Scholar 

  • National Institute of Standards and Technology (NIST) 800-161 (2015), Supply chain risk management practices for federal information systems and organizations. U.S. Department of Commerce, p 9

    Google Scholar 

  • Polydys ML, Wisseman S (2009a) Software assurance in acquisition: mitigating risks to the enterprise. Technical paper. http://www.dtic.mil/dtic/tr/fulltext/u2/a495389.pdf

  • Polydys ML, Wisseman S (2009b) Software assurance in acquisition: mitigating risks to the enterprise. Occasional paper, Information Resources Management College. http://www.dtic.mil/dtic/tr/fulltext/u2/a495389.pdf

  • Porter M (2008) Competitive advantage: creating and sustaining superior performance. Simon and Schuster, New York

    Google Scholar 

  • Sengupta A (2011) Method for processing documents containing restricted information: Google patents

    Google Scholar 

  • Swanson M, Bartol N, Moorthy R (2010) Piloting supply change risk management practices for federal information systems. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, p 1

    Google Scholar 

  • Tummala R, Schoenherr T (2011) Assessing and managing risks using the Supply Chain Risk Management Process (SCRMP). Supply Chain Manag 16(6):474–483

    Article  Google Scholar 

  • US Chamber of Commerce, International Affairs (2016) Preventing de globalization: an economic and security argument for free trade and investment in ICT. https://www.uschamber.com/sites/default/files/documents/files/preventing_deglobalization_1.pdf

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alsmadi, I. (2019). Acquisition Management. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-02360-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02360-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02359-1

  • Online ISBN: 978-3-030-02360-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics