Menu Search Account

LegiStorm

Get LegiStorm App Visit Product Demo Website
» Get LegiStorm App
» Get LegiStorm Pro Free Demo

Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities

  Premium   Download PDF Now (50 pages)
Report Type Reports and Testimonies
Report Date Oct. 9, 2018
Release Date Oct. 9, 2018
Report No. GAO-19-128
Summary:

In recent cybersecurity tests of major weapon systems DOD is developing, testers playing the role of adversary were able to take control of systems relatively easily and operate largely undetected.

DOD's weapons are more computerized and networked than ever before, so it's no surprise that there are more opportunities for attacks. Yet until relatively recently, DOD did not make weapon cybersecurity a priority. Over the past few years, DOD has taken steps towards improvement, like updating policies and increasing testing.

Federal information security—another term for cybersecurity—has been on our list of High Risk issues since 1997.

Today's weapon systems are heavily computerized, which opens more attack opportunities for adversaries (represented below in a fictitious weapon system for classification reasons).

Drawing of a fictitious weapon system showing multiple computerized systems, which make it more vulnerable to attacks.

Drawing of a fictitious weapon system showing multiple computerized systems, which make it more vulnerable to attacks.

« Return to search Government Accountability Office reports