|
|
|||
|
||||
OverviewAdditive manufacturing (AM) has been proven to provide multiple benefits over traditional manufacturing methods including cost-savings, mission adaptability, and increased unit capabilities. Multiple Department of Defense (DOD) organizations are exploring and utilizing AM technology, and efforts are ongoing to determine how best to achieve large-scale adoption of AM in the U.S. Navy (USN). The primary concern that must be addressed is the trustworthiness of AM objects to ensure they will not increase risks to personnel, equipment, and systems. Including cybersecurity throughout the AM life cycle is a necessary component of protecting AM data and ensuring trust in AM objects to support adoption. This thesis reviews aspects of cybersecurity domain as it is applied to AM, and discusses the insights of a survey conducted with USN, U.S. Army (USA), and U.S. Air Force (USAF) resident NPS students. The goal of the survey was to contrast current understanding of adoption of technology and cybersecurity threats in AM, with the knowledge, attitudes, and opinions that prospective users have. The thesis identifies barriers to achieve large-scale adoption of AM in the naval domain with special emphasis on cybersecurity, and proposes approaches to address those barriers and support accelerated adoption of AM. I. INTRODUCTION * A. RESEARCH DOMAIN * B. MOTIVATION FOR RESEARCH * C. RESEARCH QUESTIONS * D. SCOPE * E. THESIS CONTRIBUTION * F. THESIS STRUCTURE * II. BACKGROUND * A. BRIEF HISTORY AND EXPLANATION OF AM * 1. Benefits of AM * 2. Concerns * B. CURRENT STATE OF NAVAL AM DOMAIN * C. AM DIGITAL THREAD AND CYBERSECURITY * D. DIFFUSION OF INNOVATION * 1. Conditions for Successful Adoption * E. HUMAN ROLE IN CYBERSECURITY * III. AM CYBERSECURITY THREATS IN NAVAL DOMAIN * A. INTRODUCTION * B. DATA INPUT * C. INSIDER THREAT * D. POWER THREATS * E. CHAPTER SUMMARY * IV. USER STUDY * A. INTRODUCTION * B. STUDY DESIGN * C. METHODOLOGY * D. APPARATUS * E. SUBJECTS * F. RESULTS AND DISCUSSION * 1. Demographics * 2. Use of Technology, Exposure to Media, and Technology Influences * 3. Use of Applications, Exposure to Media and Application Influences * 4. Recreational Resources * 5. 3D Printing * 6. Adoption * 7. Cyber * G. CHAPTER SUMMARY * V. CONCLUSIONS AND RECOMMENDATIONS * A. MAIN CONCLUSIONS * 1. Layered Solutions * 2. Stand-Alone Ability * 3. Adoption Impediments * B. THESIS CONTRIBUTIONS * C. FUTURE WORK * 1. Joint AM * 2. Blockchain applicability Full Product DetailsAuthor: U S Military , Department of Defense (Dod) , Michael GrimshawPublisher: Independently Published Imprint: Independently Published Dimensions: Width: 21.60cm , Height: 0.60cm , Length: 27.90cm Weight: 0.263kg ISBN: 9781717825247ISBN 10: 1717825249 Pages: 104 Publication Date: 18 July 2018 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: In stock We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |