Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
Measuring The Utility Of A Cyber Incident Mission Impact Assessment (Cimia) Process For Mission Assurance, Christy L. Peterson
Measuring The Utility Of A Cyber Incident Mission Impact Assessment (Cimia) Process For Mission Assurance, Christy L. Peterson
Theses and Dissertations
Information is a critical asset on which virtually all modern organizations depend upon to meet their operational mission objectives. Military organizations, in particular, have embedded Information and Communications Technologies (ICT) into their core mission processes as a means to increase their operational efficiency, exploit automation, improve decision quality, and shorten the kill chain. However, the extreme dependence upon ICT results in an environment where a cyber incident can result in severe mission degradation, or possibly failure, with catastrophic consequences to life, limb, and property. These consequences can be minimized by maintaining real-time situational awareness of mission critical resources so appropriate …
Forensic Analysis Of Vmware Hard Disks, Manish Hirwani
Forensic Analysis Of Vmware Hard Disks, Manish Hirwani
Theses
With the advancement in virtualization technology, virtual machines (VMs) are becoming a common and an integral part of datacenters. As the popularity and use of VMs increases, incidents involving them are also on the rise. There is substantial research on using VMs and virtual appliances to aid forensic investigation, but research on collecting evidence from VMs following a forensic procedure is lacking. This thesis studies a forensically sound way to acquire and analyze VM hard disks. It also discusses the development of a tool which assists in forensic analysis of snapshots of virtual hard disks that are used in VMs. …
Evaluation Of Cryptographic Construction Properties And Security Requirements Of Modern Secure Hashing Algorithms, Benjamin Denton
Evaluation Of Cryptographic Construction Properties And Security Requirements Of Modern Secure Hashing Algorithms, Benjamin Denton
Theses
No abstract provided.