Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Regis University

Theses/Dissertations

2011

MS Systems Engineering

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

The Vulnerability Assessment And Penetration Testing Of Two Networks, Steven L. Simpson Dec 2011

The Vulnerability Assessment And Penetration Testing Of Two Networks, Steven L. Simpson

Regis University Student Publications (comprehensive collection)

Vulnerability assessments and penetration testing are two approaches available for use by internet security practitioners to determine the security posture of information networks. By assessing network vulnerabilities and attempting to exploit found vulnerabilities through penetration testing security professionals are able to evaluate the effectiveness of their network defenses by identifying defense weaknesses, affirming the defense mechanisms in place, or some combination of the two. This project is a discussion of the methods and tools used during the vulnerability assessment and penetration testing, and the respective test results of two varied and unique networks. The assessment and testing of the first …


The Insider Threat, Jacinda L. Wunderlich Oct 2011

The Insider Threat, Jacinda L. Wunderlich

Regis University Student Publications (comprehensive collection)

The Insider threat is defined similarly by experts in the information technology world for businesses, but addressing the threat has not been of great focus for most organizations. Technology and the Internet have grown exponentially over the past decade leading to changes in how business is conducted. Some basic business practices remain the same; protect the organization and its customers from breach of privacy. How data is gathered, stored, and retrieved has changed. Protecting the perimeter is still important, but these changes in technology now open the doors to a new threat; one that is known but not commonly protected …


Investigation Of Efficient Unified Threat Management In Enterprise Security, Ryan Lynn Sep 2011

Investigation Of Efficient Unified Threat Management In Enterprise Security, Ryan Lynn

Regis University Student Publications (comprehensive collection)

This thesis explores the problems that exist today with perimeter security in data communications specifically the disparate architecture that exists to mitigate risk. Currently there are many different components to the enterprise security perimeter that are not cohesive and do not collaborate well to form an efficient, scalable, operationally supportable gateway design. The thesis breaks down this problem by illustrating the shortcomings of current technologies. These illustrations are used in conjunction with published research and authored research to provide solid footing for the idea of a unified threat management or UTM model. In this model, threat prevention techniques are consolidated …


Service Delivery Utilizing Wireless Technology Within The Air Traffic Control Communication And Navigation Domain To Improve Positioning Awareness, Samuel Durbin Apr 2011

Service Delivery Utilizing Wireless Technology Within The Air Traffic Control Communication And Navigation Domain To Improve Positioning Awareness, Samuel Durbin

Regis University Student Publications (comprehensive collection)

Current air traffic levels around the world have pushed the enterprise architecture deployed to support air traffic management to the breaking point. Technology limitations prevent expansion of the current solutions to handle rising utilization levels without adopting radically different information delivery approaches. Meanwhile, an architectural transition would present the opportunity to support business and safety requirements that are not currently addressable. The purpose of this research paper is to create a framework for more effectively sharing positioning information utilizing improved air traffic control navigation and communication systems.


Mandated Government Regulations In Healthcare: Is Healthcare It Overregulated? A Post Mandate Study, Mark Albright Mar 2011

Mandated Government Regulations In Healthcare: Is Healthcare It Overregulated? A Post Mandate Study, Mark Albright

Regis University Student Publications (comprehensive collection)

Over the past decade, healthcare organizations have been subjected to many federally mandated statutes to comply with. Three of the biggest statutes over the last decade are the Health Information Portability and Accountability Act (HIPAA), the Red Flag Rules, and the Health Information Technology for Clinical Health (HITECH). These mandates deal directly with the security of electronic patient information. To date, many entities have provided estimations of cost of compliance. Some have provided quantitative models to calculate the return of IT investments. Very few have attempted to look retrospectively and determine the level of and barriers to compliance. This quantitative …