Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Air Force Institute of Technology

2005

Data protection

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel Mar 2005

Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel

Theses and Dissertations

The insider threat is a major concern for organizations. Open markets, technological advances, and the evolving definition of employee have exacerbated the insider threat. Insider threat research efforts are focusing on both prevention and detection techniques. However, recent security violation trends highlight the damage insider attacks cause organizations and illuminate why organizations and researchers must develop new approaches to this challenge. Although fruitful research is being conducted and new technologies are being applied to the insider threat problem, companies remain susceptible to the costly damage generated by insider threat actions. This research explored how visualization tools may be useful in …


An Analysis Of Biometric Technology As An Enabler To Information Assurance, Darren A. Deschaine Mar 2005

An Analysis Of Biometric Technology As An Enabler To Information Assurance, Darren A. Deschaine

Theses and Dissertations

The use of and dependence on, Information technology (IT) has grown tremendously in the last two decades. Still, some believe the United States is only in the infancy of this growth. This explosive growth has opened the door to capabilities that were only dreamed of in the past. As easy as it is to see how advantageous this technology is, it also is clear that with its advantages come distinct responsibilities and new problems that must be addressed. For instance, the minute one begins using information processing systems, the world of information assurance (IA) becomes far more complex. As a …