Examining Security Awareness Lapses and Critical Cyber Threats Against the Department of Defense Military Supply Chain Systems

Examining Security Awareness Lapses and Critical Cyber Threats Against the Department of Defense Military Supply Chain Systems

DOI: 10.4018/979-8-3693-1634-4.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber threats have become a major concern in today's world. As the United States Department of Defense (DoD) increasingly relies on the military supply chain systems to support the operations of their military forces, cyber threats have the potential to cause significant damage. These systems are responsible for the transportation, storage, and distribution of materials and equipment from the supplier to the end user, which includes both military personnel and civilian personnel. It is also responsible for the acquisition, maintenance, and disposal of materials and equipment. The purpose of this chapter is to examine the critical cyber threats posed to the DoD military supply chain systems and provide recommendations to address them.
Chapter Preview
Top

Introduction

The military supply chain is integral to any military operation (D'Mello & Sharman, 2018). It is responsible for procuring, storing, and delivering supplies and equipment to the right place, at the right time, and in the right quantities (Bajwa, 2016). The military supply chain is complex, dynamic, and subject to numerous risks. Cyber threats to the military have become increasingly prominent over the past decade (Feng, 2019). Cyber-attacks can target any military area, from its communications networks and weapons systems to its personnel and critical infrastructure (US Department of Defense, 2017). Several identified Nation states, criminal organizations, and terrorist groups are potential sources of cyber-attacks against military systems (Chu, 2019). In recent years, Russia and China identify as significant actors in cyber espionage against the United States (US Department of Defense, 2017). Criminal organizations are also a significant threat, with their activities ranging from the theft of sensitive data to the disruption of operations (Dudley, 2019). Several terrorist groups have engaged in cyber-attacks against the US to disrupt operations, causing panic and confusion (US Department of Defense, 2018).

The consequences of these threats can range from the disruption of operations and the loss of sensitive data to the destruction of critical infrastructure and the loss of life (US Department of Defense, 2017). Cyber-attacks seek access to sensitive information that could be used to gain an advantage on the battlefield (Chu, 2019). They can also disrupt operations and communications networks, potentially causing significant delays and disruption to military operations (US Department of Defense, 2017). In extreme cases, cyber-attacks can cause physical damage and destruction, such as the Stuxnet attack against Iranian nuclear facilities in 2010 (Langner, 2014).

In order to protect against these threats, the military must remain vigilant in its efforts to identify, prevent, and respond to cyber threats, which includes developing and implementing effective policies and procedures to protect against cyber-attacks and monitoring networks and systems for suspicious activity (US Department of Defense, 2017). The military must also train personnel on cybersecurity measures, such as secure password management and data storage (US Department of Defense, 2018). Additionally, the military must be prepared to respond to cyber threats by developing and maintaining an effective incident response plan (US Department of Defense, 2017). This paper provides an overview of the military supply chain, including the main elements and processes and the supply chain risks. It further discusses the role of logistics in military supply chains and the application of lean principles to the military supply chain. Finally, it examines the importance of supply chain security and resilience to the success of military operations.

Complete Chapter List

Search this Book:
Reset