Defense Industrial Base Sector Organizations Critical Assets
A critical asset is any system, person, process, or data deemed vital to an organization of which when in crisis could cause a huge impact to the organization. Understanding this, the information age has brought a lot of opportunities that have revolutionized the world. Data is the new oil in the modern information age, and organizations are usinggathered data to gain valuable business insights(Manulis, 2021). The levels of data that organizations handle is high. That, coupled with the fact that the systems are ran with interconnected network and database systemscreates room for cyber security threats. Globally, the digital landscape is under constant risks from potential cyber threats due to the vulnerable nature of networked systems(Cristea, 2020). In the United States, there are 16 critical industrial sectors whose assets or systems are considered very vital that any interruption or destruction would have a devastating effect on security, national economic security, and/or national public health. This paper aims to give an insight into core target systems and processes in organizations at risk from global threats forone of the 16 critical industrial sectors, the Defense Industrial Base (DIB) Sector.
Defense Industrial Base (DIB) Sector
The DIB Sector is known to be the global industrial complex that enables the design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts to meet US military requirements(CISA, n.d.). The DIB partnership includes Department of Defense (DoD) components, over 100,000 DIB companies and their subcontractors who perform under contract to the DoD, companies that provide supplementary materials and services to the DoD, and government-owned/contractor-operated and (CISA, n.d.). DIB assets are in many countries, and they provide products and services that are vital to mobilize, deploy, and sustain the operations of the military (CISA, n.d.). Due to having assets in various countries, the sector is exposed to cyber threats both domestic and foreign.
DIB Organizations
DIB organizations are grouped into two charters as shown in figure 1: Government Coordinating Council Charter (GCC) and Sector Coordinating Council Charter (SCC). While the GCC mostly comprise of government infrastructures, the SCC is mostly private enterprises with affiliations to the government(CISA, n.d.). An attack on any of the organizations from these charters could affect other organizations and probably cripple or cause a devasting damage or destruction of critical assets because of the interconnection that exists between charters and organizations.The GCC is a parallel and partner to the SCC(CISA, n.d.). Within the Critical Infrastructure Partnership Advisory Council (CIPAC), the two charters collaborate to uncover and share threat intelligence, assess, and mitigate vulnerabilities, and monitor the DIB’s security and resiliency(CISA, n.d.).
Figure 1
DIB Membership
Government Coordinating Council Charter (GCC)
The GCC’s purpose is to strengthen the security and resilience of the DIB, particularly those firms designated by the DoD as vital infrastructure(CISA, n.d.). The GCC’s mission is to facilitate interagency, intergovernmental, and and across sectors, as well as to collaborate with SCCs on public-private partnerships(CISA, n.d.).The GCC serves as a venue for government partners to share information, collaborate, and define and monitor actions to strengthen the DIB sector’s security and resilience. Vital organizations under the GCC can be seen in Table 1.
Sector Coordinating Council Charter (SCC)
Table 1 also shows organizations under the SCC that face risk of a cyberattack. The SCC’s objective is to support the US Defense Industry’s advancements in security, resilience, and critical infrastructure protection, both as an industry coordinating body within the DIB sector and in collaboration with the DIB SSA and the GCC(CISA, n.d.). The National Defense Information Sharing and Analysis Center (National Defense ISAC), which supports the SCC as the sector’s information sharing, analysis, and operational mechanismmaintains relevant coordination with operational activities of the Federal government and other operational organizations(CISA, n.d.).
Core Target Systems at Risk
Looking at Table 1,DIB is composed of various organizations of vast trades making DIB acomplex and huge sector governed by various regulations, laws, treaties, and practices. With such a huge database of organizations that affects government, private, and international organizations, it is important to identify systems that are considered vital to the sector such that if
Table 1
DIB Charters and their Organizations
Government Coordinating Council Sector Coordinating Council
Office of the Director of National Intelligence
National Security Council
U.S. Department of Commerce
Office of Technology Evaluation, Bureau of Industry and Security
U.S. Department of Defense
Director of the Joint Staff
Office of the Assistant Secretary of Defense and Global Security
Office of the Assistant Secretary of Defense for Logistics and Material Readiness
Office of DoD Chief Information Officer
Office of the Chief, National Guard Bureau
Office of the Under Secretary of Defense for Acquisition and Sustainment
Office of the Under Secretary of Defense for Intelligence
Office of the Under Secretary of Defense for Personnel and Readiness
U.S. Department of Energy
U.S. Department of Homeland Security
Cybersecurity and Infrastructure Security Agency
U.S. Department of Justice
Federal Bureau of Investigation
U.S. Department of State
Bureau of Political-Military Affairs
U.S. Department of the Treasury
Office of Critical Infrastructure Protection & Compliance Policy
Abbvie, Inc., Accenture Federal Services LLC, American Bureau of Shipping, AECOM, Aerojet Rocketdyne, The Aerospace Corporation, Aerospace Industries Association, Airbus Defense and Space, Airbus Americas, American Society of Industrial Security (ASIS) International, American Systems, Inc., Analog Devices, Inc, Armstrong Teasdale, Ashland LLC, Autodesk, Inc., BAE Systems, Inc., Ball Aerospace & Technologies Corporation, Bank of America, The Boeing Company, Booz Allen Hamilton, Box, Inc., CACI International, Inc., Centurum, Inc, Cisco Systems, Inc., Citigroup, Inc., Click Bond, Inc., Cobham Advanced Electronic Solutions, Inc., Concurrent Technologies Corporation, Corning Inc., Covestro LLC, CPI International, Inc., Cubic Corporation, Defense and Intelligence Council, Dell (EMC Corporation), Deloitte Global, The Dow Chemical Company, DRS Technologies, Inc., DynCorp International, Eastern Research Group, Inc., Eastman Chemical Company, Eaton Aerospace Ltd., Eccalon LLC, Emerson Electric Co., The Espy Corporation, Exostar, Fifth-Third Bank, FlighSafety International, Frontier Technology, Inc, General Atomics, General Dynamics, General Electric Aviation, GE Digital, General Motors, Honeywell, Huntington Ingalls Industries, iDirect Government, InCadence Strategic Solutions, Ingalls Shipbuilding, Institute for Defense Analyses, Inc., Integrated Security Technologies, IPG Photonics, Integrity Solutions Consulting Group, LLC, Intertek Laboratories, Inc, IT Cadre, John Hopkins University / Applied Physics Laboratory (JHU/APL), JRC Integrated Systems, Inc., Kratos Defense, L3Harris Technologies, Inc., Leidos, Leonardo DRS, Inc., LGS Innovations, Lumen, Lockheed Martin Corporation, Lyondellbasell Industries, Inc., ManTech International, Maxar Technologies, Inc., Mercury Systems, Inc., Michael Baker International LLC, MIT Lincoln Laboratory, MITRE Corporation, MITRON, Modern Technology Solutions, Inc., Motorola Solutions, Inc., M-Tron Industries, Inc, MtronPTI, National Classification Management Society (NCMS), National Defense Industrial Association (NDIA), National Defense ISAC, NBC Universal Media, Net Vision Consultants, Inc., Nextera Energy, Inc., North Atlantic Industries, Northern Aviation Services, Inc., Northrop Grumman Corporation, Ocean Riders, Olin Corporation, Oshkosh Defense LLC, Palo Alto Networks, The Parsons Corporation, Peerless Technologies, Pennsylvania State University (PSU ARL), Peraton, Inc., Percipient.ai, Pfizer, PPG Aerospace, PreCast Corporation, Precision Castparts Corporation, Proctor & Gamble, RAND Corporation, Raytheon Technologies, Referentia Systems, Inc., Rocket Communications, Inc., Rockwell Collins Aerospace, Rockwell Collins, Inc., Rolls-Royce, S&P Global, Inc., Saab USA, Salesforce, SAP America, Inc., SAP NS2, Science Applications International Corporation (SAIC), Securitas Critical Infrastructure Services, Inc. (SCIS), ServiceNow, Sierra Nevada Corporation, Slack Technology, Inc., Software Engineering Institute, Space Dynamics Laboratory, SRC, Inc., System Planning & Analysis, Inc. (SPA), Textron, Inc., Toyon Research Corporation, Ultra Electronics Defense, Ultra Electronics- USSI, United Launch Alliance LLC, United Technologies, University of Nebraska / DoD UARC, US Bank, Undersea Sensor Systems, Inc., Varen Technologies, Verizon, Win-Tech, Inc., X8 LLC
attacked could become a catastrophe. Unlike other industrial sectors, the DIB is not solely defined by the type of goods and services it delivers, rather by who the customer for these goods and services is(CISA, n.d.). Companies performing under direct contract with the DoD, their subcontractors, and companies providing incidental materials and services to either are all included and are from various industrial sectors and sub-sectors. These include both services and products, and ranges from one-person or family-owned businesses to the world’s largest corporations as listed in Table 1(CISA, n.d.). As a result of the large and complex collection of organizations, the DoD is tasked to collect information such as contractor and government entity code, company name, location information, subject matter expert, security officers information, etc. on critical assets(CISA, n.d.).
The core target systems and networks for the DIB sector ranges from machineries to personnel. Protecting these systems and networks should be of utmost importance to DoD. Some of these systems are GPS trackers, aircrafts, missiles, nuclear weapons, rockets, submarines, combat vehicles, weapons, ammunition, computers, automated systems, cloud database, and employees of contractors and subcontractors. Given the sensitive nature of this sector, hackers and the DIB sectors since the sector carries highly confidential data and intellectual property.
Furthermore, the DIB is divided into Segments, Sub-segments, and Commodities, which manufacture weapon system platforms, components, and expendables (CISA, n.d.). This categorization is used throughout the Department of Defense to classify the contributions of specific DIB assets as well as to analyze the criticality using subject matter experts from each of the areas. The classification alsois most applicable to the analysis of impact on DoD mission accomplishment, but it may also contribute to the areas of economic, life, and health consequences. Furthermore, the classification aids in identifying the critical assets of the DoD. Table 2 lists out these segments in relation to the organizations.
Table 2
Critical Segments and Organizations
Segments Organizations
Aircraft
Jet Fighters
Helicopters
Drones GCC
Office of the Director of National Intelligence
National Security Council
DoD
DHS
SCC
Ammunition GCC
Office of the Director of National Intelligence
National Security Council
DoD
U.S. Department of Justice
U.S. Department of State
Combat Vehicle GCC
Office of the Director of National Intelligence
National Security Council
DoD
U.S. Department of State
SCC
Electronics
Electronic Warfare
SONAR
RADAR GCC
Office of the Director of National Intelligence
National Security Council
DoD
U.S. Department of Justice
U.S. Department of State
SCC
Information Technology
Command, Control, Computers and Accessories, and Intelligence
Data Security
Trainers and Simulators GCC
Office of the Director of National Intelligence
National Security Council
DoD
DHS
U.S. Department of Justice
U.S. Department of State
SCC
Missile
Tactical Missile
Torpedo
Strategic Missile GCC
Office of the Director of National Intelligence
National Security Council
DoD
U.S. Department of State
Shipbuilding
Submarines
Surface Ships GCC
Office of the Director of National Intelligence
National Security Council
DoD
U.S. Department of State
SCC
Space
Launch vehicle
Satellite GCC
Office of the Director of National Intelligence
National Security Council
DoD
U.S. Department of State
SCC
Troop Support
Soldier Systems
Base
Clothing
Medical
Smoke Obscurant
Nuclear, Biological, and Chemical Systems GCC
Office of the Director of National Intelligence
National Security Council
DoD
U.S. Department of State
SCC
Weapons GCC
Office of the Director of National Intelligence
National Security Council
DoD
DHS
U.S. Department of Justice
U.S. Department of State
SCC
The US military bases provide accommodation services to soldiers as part of Troop Supportand serve as training centers, bunkers, or command centers(Solar, 2020). The military bases also store some vital assets and for these reasons, emphasis on security is important especially with bases in foreign land. The military base houses some of the critical segments listed in Table 2 such as aircrafts, ammunitions, weapons, combat vehicles, computers with highly classified data, missiles, and nuclear, biological, and chemical systems. A data breach to any military base could be very disastrous as it affects multiple organizations in both charters of the DIB(Cristea, 2020). (Burton &lain, 2020) stated that enemies mainly target military bases to obtain strategic intelligence data on the technology of the military to understand its capabilities.A potential breach to the DIB organizations could put some important data in the hands of the enemy and spell doom for the United States.
Potential Mode of Attack
Data is often viewed as a critical component of modern military surveillance and intelligence gathering. The DoD invests billions of dollars in military intelligence and surveillance systems(Eldem, 2020). The data collected and stored by these systems is highly sensitive and confidential and provides critical and timely information for special missions.
If these systems are accessed and data exfiltrated, there may be serious consequences(Karaman et al., 2016). Under the modern era of big data, hackers mainly use malware, phishing, and spoofing to target data systems leaving heavy losses on the victims(Manulis et al., 2021). Figure 2 is a depiction of a potential mode of attack to the DIB sector. An attacker could remotely through the internet, gain access to a DIB Organizations network and in turn gain access to the systems storing information on the critical segments. Alternatively, the attacker could go through a modem or a wireless device via a compromised VPN. An example of a remote breach is the RussianSandworm group using BlackEnergy to target NATO member nations and meddling in the US elections (Maynard, et al., 2020). Figure 3 shows a local attack. Often, organizations focus on external threats, overlooking the potential of the internal actors, of which some may be acting in ignorance, or the attack may be generated from system failure thereby shutting down critical infrastructures. In figure 3, two modes of attack are depicted. The first mode has an oblivious employee responding to a phishing email thereby granting the system access to the server and cloud server storing critical data on the segments. The second mode is a system malfunction that ends up sending corrupt data to the server which could leak information on critical segments or create a total shutdown of systems.
Figure 2
Remote Attack
Figure 3
Local Access within a DIB Organization
Conclusion
The DIB sector comprises of many organizations that are interconnected, and some are also connected to other sectors such as the communication and energy sector. A breach in any of the organizations of the DIB sector could be detrimental not only to the DoD, but to many private organizations with ties to the sector. Identifying the critical assets is the first step towards protecting them. These assets are not limited to systems and equipment alone, but to personnel, data, and organizations producing the commodities and segments.
References
Burton, J., & Lain, C. (2020). Desecuritising cybersecurity: towards a societal approach. Journal of Cyber Policy, 5(3), 449470. https://doi.org/10.1080/23738871.2020.1856903
CISA. (n.d.). Defense Industrial Base Sector | CISA. Www.cisa.gov. https://www.cisa.gov/defense-industrial-base-sector
CISA. (n.d.). Defense Industrial Base Sector Coordinating Council Charter | CISA. Www.cisa.gov. https://www.cisa.gov/sites/default/files/publications/DIB_SCC_CHARTER_RATIFIED_1-23-2019-508v2.pdf
CISA. (n.d.). Defense Industrial Base Sector-Specific Plan | CISA. Www.cisa.gov. https://www.dhs.gov/xlibrary/assets/nipp-ssp-defense-industrial-base.pdf
Cristea, L. M. (2020). Current security threats in the national and international context. JOURNAL of ACCOUNTING and MANAGEMENT INFORMATION SYSTEMS, 19(2), 351378. https://doi.org/10.24818/jamis.2020.02007
Eldem, T. (2019). The Governance of Turkeys Cyberspace: Between Cyber Security and Information Security. International Journal of Public Administration, 43(5), 452465. https://doi.org/10.1080/01900692.2019.1680689
Evans, C. V. (2020). Future Warfare: Weaponizing Critical Infrastructure. Parameters: U.S. Army War College, 50(2), 3542. https://doi.org/10.55540/0031-1723.1017
Karaman, M., atalkaya, H., & Aybar, C. (2016). Institutional Cybersecurity from Military Perspective. International Journal of Information Security Science, 5(1), 17. https://www.ijiss.org/ijiss/index.php/ijiss/article/view/174
Manulis, M., Bridges, C. P., Harrison, R., Sekar, V., & Davis, A. (2020). Cyber security in New Space. International Journal of Information Security. https://doi.org/10.1007/s10207-020-00503-w
Maynard, P., McLaughlin, K., & Sezer, S. (2020). Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems. Journal of Cybersecurity, 6(1), 1s. https://doi.org/10.1093/cybsec/tyaa020
Solar, C. (2020). Cybersecurity and cyber defence in the emerging democracies. Journal of Cyber Policy, 121. https://doi.org/10.1080/23738871.2020.1820546
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more