Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda Mar 2008

Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda

Theses and Dissertations

Social engineering is the art and science of persuading individuals to bypass in place security mechanisms causing the unintended release of information. It is a low tech solution to a high tech problem and is as much an art as a science. As is true of many such solutions, social engineering is both ill-defined yet extremely effective. Its low cost, high payoff nature makes it an extremely attractive alternative to adversaries that do not have access to all the resources of a nation state. However, with full backing, the weapon can become that much more effective. Social engineering is something …


Establishing The Human Firewall: Reducing An Individual's Vulnerability To Social Engineering Attacks, Jamison W. Scheeres Mar 2008

Establishing The Human Firewall: Reducing An Individual's Vulnerability To Social Engineering Attacks, Jamison W. Scheeres

Theses and Dissertations

Hackers frequently use social engineering attacks to gain a foothold into a target network. This type of attack is a tremendous challenge to defend against, as the weakness lies in the human users, not in the technology. Thus far, methods for dealing with this threat have included establishing better security policies and educating users on the threat that exists. Existing techniques aren’t working as evidenced by the fact that auditing agencies consider it a given that will be able to gain access via social engineering. The purpose of this research is to propose a better method of reducing an individual’s …


Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen Mar 2008

Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen

Theses and Dissertations

As is well understood, the rapidly unfolding challenges of cyberspace is a fundamental warfare paradigm shift revolutionizing the way future wars will be fought and won. A significant test for the Air Force (indeed any organization with a credible presence in cyberspace) will be providing a realistic training environment that fully meets this challenge. Why create another Flag level exercise? Realistic training (that which is effective, comprehensive and coordinated) is crucial to success in time of war. Red Flag provides dominant training within the air domain and now with the evolution of cyberspace, a comprehensive training environment is necessary to …


Integration Of Information Operations Theory Into The Corporate Air Force, Thomas R. Kettles Jr. Mar 2008

Integration Of Information Operations Theory Into The Corporate Air Force, Thomas R. Kettles Jr.

Theses and Dissertations

The purpose of this research was to determine the desired end-state for company grade officers in terms of an information operations education. Specifically, an examination of company grade officer curricula from the pre-commissioning sources to the Squadron Officer College was performed. This assessment was then compared to the Air Force Institute of Technology Cyber Competency Areas Framework. Any areas that were missing from the current company grade officer curricula were identified and a proposed implementation plan was presented to correct these deficiencies. To aid in developing an implementation plan, redundancies between the two Squadron Officer College courses were identified. Furthermore, …