Abstract
The process of acquiring computing resources includes several activities related to planning, budgeting, comparing alternative options, configuration and change management, etc. Our focus in this book is on securing information and computing resources. As such, selected KSAs as well as the content of each KSA will be focused on this subject only.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
(CSD), NIST Computer Security Division (2010) NISTIR 7622 draft, piloting supply chain risk management practices for federal information systems (DRAFT), pp 1–78
Acq.osd.mil (2011) Program protection plan outline & guidance, Ver. 1.0. Deputy Assistant Secretary of Defense, Systems Engineering. https://www.acq.osd.mil/se/initiatives/init_pp-sse.html
Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Ali Al-Qudah M, Al-Omari A (2018) Security and access controls: lesson plans. In: Practical information security. Springer, Cham
Alves P, Campos P, Oliveira E (2012a) Modeling the trustworthiness of a supplier agent in a B2B relationship. In: Camarinha-Matos LM, Xu L, Afsarmanesh H (eds) Collaborative networks in the internet of services. PRO-VE 2012. IFIP advances in information and communication technology, vol 380. Springer, Berlin
Alves P, Campos P, Oliveira E (2012b) Modeling the trustworthiness of a supplier agent in a B2B relationship, PRO-VE 2012. International Federation for Information Processing IFIP AICT 380, pp 675–686
Blos MF, Quaddus M, Wee HM, Watanabe K (2009) Supply chain risk management (SCRM): a case study on the automotive and electronic industries in Brazil. Supply Chain Manag 14(4):247–252
Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply chain risk management practices for federal information systems and organizations. https://doi.org/10.6028/nist.sp.800-161
Defense Acquisition University Press (2001) System engineering fundamentals. http://acqnotes.com
Department of Homeland Security Cyber Security Division (2007) Software assurance in acquisition: mitigating risks to the enterprise, Draft Version 1.0
DHS (2008) Acquisition instruction/guidebook, 102-01-001, INTERIM, Version 1.9
DOE (2018) DOE G 430.1-1 Chp 23, life cycle cost estimate. https://www.directives.doe.gov/directives-documents/400-series/0430.1-EGuide-1-Chp23
Grady JO (2006) System requirements analysis. Academic, Cambridge
Hutton JP (2010) United States Government Accountability Office, Deepwater requirements, quantities, and cost require revalidation to reflect knowledge gained, GAO-10-790, https://www.gao.gov/assets/310/307742.html
Ivancic WD, Vaden KR, Jones RE, Roberts AM (2015) Operational concepts for a generic space exploration communication network architecture, Technical report, NASA Glenn Research Center
National Institute of Standards and Technology (NIST) 800-161 (2015), Supply chain risk management practices for federal information systems and organizations. U.S. Department of Commerce, p 9
Polydys ML, Wisseman S (2009a) Software assurance in acquisition: mitigating risks to the enterprise. Technical paper. http://www.dtic.mil/dtic/tr/fulltext/u2/a495389.pdf
Polydys ML, Wisseman S (2009b) Software assurance in acquisition: mitigating risks to the enterprise. Occasional paper, Information Resources Management College. http://www.dtic.mil/dtic/tr/fulltext/u2/a495389.pdf
Porter M (2008) Competitive advantage: creating and sustaining superior performance. Simon and Schuster, New York
Sengupta A (2011) Method for processing documents containing restricted information: Google patents
Swanson M, Bartol N, Moorthy R (2010) Piloting supply change risk management practices for federal information systems. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, p 1
Tummala R, Schoenherr T (2011) Assessing and managing risks using the Supply Chain Risk Management Process (SCRMP). Supply Chain Manag 16(6):474–483
US Chamber of Commerce, International Affairs (2016) Preventing de globalization: an economic and security argument for free trade and investment in ICT. https://www.uschamber.com/sites/default/files/documents/files/preventing_deglobalization_1.pdf
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alsmadi, I. (2019). Acquisition Management. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-02360-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-02360-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02359-1
Online ISBN: 978-3-030-02360-7
eBook Packages: EngineeringEngineering (R0)