Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Regis University

Theses/Dissertations

2011

MS Information Assurance

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Computer Security Policy: Preventing Vulnerabilities And The Impact Of Selective Enforcement On An Organization, Latrice D. Parker-Stewart Jul 2011

Computer Security Policy: Preventing Vulnerabilities And The Impact Of Selective Enforcement On An Organization, Latrice D. Parker-Stewart

Regis University Student Publications (comprehensive collection)

This project focuses on the importance of a computer security policy as a whole. It also looks at how security policies assist in preventing vulnerabilities that may be instigated by employees. Moreover, the project views how the concept of selective enforcement can affect and impact an organization. This project delves into actual cases of employee misconduct in various organizations. It explains how policies were violated and the repercussions of these various misdeeds. Finally the project discusses different items that a good security policy should have and how important it is for policies to be enforced. It is vital that an …


Uncovering Network Perimeter Vulnerabilities In Cisco Routers According To Requirements Defined In Pci Dss 2.0, David E. Naples Jun 2011

Uncovering Network Perimeter Vulnerabilities In Cisco Routers According To Requirements Defined In Pci Dss 2.0, David E. Naples

Regis University Student Publications (comprehensive collection)

According to the Payment Card Industry (PCI), over 500 million records containing sensitive cardholder data have been breached since January 2005. Merchants accepting credit and debit cards are at the center of payment card transactions, making it crucial that standard security procedures and technologies are employed to thwart cardholder data theft. Numerous organizations have experienced embarrassing breaches, which lead to losses of credit card data, including Starbucks, California Pizza Kitchen, and TJX Companies. This paper examined an action research methodology to test the security of a network router and remediate all the vulnerabilities that caused it to fail the requirements …


Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett Apr 2011

Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett

Regis University Student Publications (comprehensive collection)

Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …


Information Assurance; Small Business And The Basics, William Samuel Fleming Iv Jan 2011

Information Assurance; Small Business And The Basics, William Samuel Fleming Iv

Regis University Student Publications (comprehensive collection)

Business is increasingly dependent on information systems to allow decision makers to gather process and disseminate information. As the information landscape becomes more interconnected, the threats to computing resources also increase. While the Internet has allowed information to flow, it has also exposed businesses to vulnerabilities. Whereas large businesses have information technology (IT) departments to support their security, small businesses are at risk because they lack personnel dedicated to addressing, controlling and evaluating their information security efforts. Further complicating this situation, most small businesses IT capabilities have evolved in an ad hoc fashion where few employees understand the scope of …