Addressing Attack Vectors Within the Acquisition Supply Chain and the System‐Development Lifecycle. Issue 2 (July 2013)