Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Entire DC Network
Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda
Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda
Theses and Dissertations
Social engineering is the art and science of persuading individuals to bypass in place security mechanisms causing the unintended release of information. It is a low tech solution to a high tech problem and is as much an art as a science. As is true of many such solutions, social engineering is both ill-defined yet extremely effective. Its low cost, high payoff nature makes it an extremely attractive alternative to adversaries that do not have access to all the resources of a nation state. However, with full backing, the weapon can become that much more effective. Social engineering is something …
Establishing The Human Firewall: Reducing An Individual's Vulnerability To Social Engineering Attacks, Jamison W. Scheeres
Establishing The Human Firewall: Reducing An Individual's Vulnerability To Social Engineering Attacks, Jamison W. Scheeres
Theses and Dissertations
Hackers frequently use social engineering attacks to gain a foothold into a target network. This type of attack is a tremendous challenge to defend against, as the weakness lies in the human users, not in the technology. Thus far, methods for dealing with this threat have included establishing better security policies and educating users on the threat that exists. Existing techniques aren’t working as evidenced by the fact that auditing agencies consider it a given that will be able to gain access via social engineering. The purpose of this research is to propose a better method of reducing an individual’s …
Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen
Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen
Theses and Dissertations
As is well understood, the rapidly unfolding challenges of cyberspace is a fundamental warfare paradigm shift revolutionizing the way future wars will be fought and won. A significant test for the Air Force (indeed any organization with a credible presence in cyberspace) will be providing a realistic training environment that fully meets this challenge. Why create another Flag level exercise? Realistic training (that which is effective, comprehensive and coordinated) is crucial to success in time of war. Red Flag provides dominant training within the air domain and now with the evolution of cyberspace, a comprehensive training environment is necessary to …
Integration Of Information Operations Theory Into The Corporate Air Force, Thomas R. Kettles Jr.
Integration Of Information Operations Theory Into The Corporate Air Force, Thomas R. Kettles Jr.
Theses and Dissertations
The purpose of this research was to determine the desired end-state for company grade officers in terms of an information operations education. Specifically, an examination of company grade officer curricula from the pre-commissioning sources to the Squadron Officer College was performed. This assessment was then compared to the Air Force Institute of Technology Cyber Competency Areas Framework. Any areas that were missing from the current company grade officer curricula were identified and a proposed implementation plan was presented to correct these deficiencies. To aid in developing an implementation plan, redundancies between the two Squadron Officer College courses were identified. Furthermore, …