Preface |
|
iii | |
|
|
vii | |
|
|
ix | |
Summary |
|
xi | |
Acknowledgments |
|
xix | |
Abbreviations |
|
xxi | |
|
|
1 | (50) |
|
|
2 | (1) |
|
Organization of This Report |
|
|
3 | (2) |
|
Chapter Two Defining the Defense Industrial Base |
|
|
5 | (1) |
|
What Is the Defense Industrial Base? |
|
|
5 | (3) |
|
How Big Is the Defense Industrial Base? |
|
|
8 | (5) |
|
Chapter Three Current Defense Industrial Base Protections |
|
|
13 | (16) |
|
The U.S. Government's Definition of Trade Secrets and Intellectual Property |
|
|
13 | (1) |
|
DoD's Current Approach to Protecting Controlled Unclassified Information |
|
|
14 | (8) |
|
Shortfalls of DoD's Current Approach to Protecting Controlled Unclassified Information |
|
|
22 | (1) |
|
|
22 | (7) |
|
Chapter Four Current Cost and State of Cybersecurity |
|
|
29 | (10) |
|
Cybersecurity Budget Estimates |
|
|
29 | (1) |
|
Estimated Information Technology Budgets of Defense Industrial Base Firms |
|
|
30 | (1) |
|
Cybersecurity Professional Salary Estimates |
|
|
31 | (2) |
|
Characteristics of a Small Sample of Defense Industrial Base Firms |
|
|
33 | (1) |
|
Comparing the Estimated and Recommended Cybersecurity Budgets of Small and Medium-Sized DIB Firms |
|
|
34 | (3) |
|
Implications for the Defense Industrial Base |
|
|
37 | (2) |
|
Chapter Five Cybersecurity Tools |
|
|
39 | (10) |
|
Cybersecurity Tools Typically Used by Small Defense Industrial Base Firms |
|
|
39 | (5) |
|
Implications for Small Defense Industrial Base Firms |
|
|
44 | (1) |
|
Cybersecurity Tools for Large Defense Industrial Base firms |
|
|
44 | (5) |
|
Chapter Six Alternative Defense Industrial Base Cybersecurity Protection Frameworks |
|
|
49 | (30) |
|
The DIB Cyber Protection Program |
|
|
49 | (3) |
|
Distribution of Controlled Unclassified Information Across Defense Industrial Base Firms |
|
|
52 | (2) |
|
Overview of DIB Cyber Protection Program Options |
|
|
54 | (1) |
|
Option A: DIB Cyber Protection Program with a Direct DoD Cybersecurity Role |
|
|
55 | (10) |
|
Option B: DIB Cyber Protection Program with DoD Indirect Role |
|
|
65 | (9) |
|
Implications for Commercial Firms with Limited DoD Contracts |
|
|
74 | (1) |
|
Proposed Legal Issues and Protections for Both Options |
|
|
74 | (5) |
|
Chapter Seven Conclusions |
|
|
79 | (8) |
|
|
79 | (2) |
|
|
81 | (6) |
|
|
|
A Detailed Network Diagrams for Cyber Protection Framework |
|
|
87 | (14) |
|
B Cybersecurity Tools from Select Cybersecurity Firms |
|
|
101 | (10) |
|
C Data Loss Prevention Tools |
|
|
111 | (8) |
References |
|
119 | |