Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2005

Systems Engineering

Computer networks--Security measures

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Study To Determine Damage Assessment Methods Or Models On Air Force Networks, Lisa S. Thiem Mar 2005

A Study To Determine Damage Assessment Methods Or Models On Air Force Networks, Lisa S. Thiem

Theses and Dissertations

Damage assessment for computer networks is a new area of interest for the Air Force. Previously, there has not been a concerted effort to codify damage assessment or develop a model that can be applied in assessing damage done by criminals, natural disasters, or other methods of damaging a computer network. The research undertaken attempts to identify if the Air Force MAJCOM Network Operations Support Centers (NOSC) use damage assessment models or methods. If the Air Force does use a model or method, an additional question of how the model was attained or decided upon is asked. All information comes …


Medical Devices, Support Networks, And Their Vulnerabilities: A Case Study Of The Integration Of Medical Networks Into The Air Force Information Network, Paul G. Oleksiak Mar 2005

Medical Devices, Support Networks, And Their Vulnerabilities: A Case Study Of The Integration Of Medical Networks Into The Air Force Information Network, Paul G. Oleksiak

Theses and Dissertations

With the implementation of "one Air Force, one network" under way it is important to look at how the Air Force plans to incorporate the medical field and its unique systems, networks, and mission. The medical field presents distinctive problems not seen in other areas. Open network vulnerabilities in the medical information systems not only pose a problem for the individual, but to the military service also. Possible security holes provide both access to vital military & personal information (end strength numbers, current status of personnel, social security), and a door way into the "network". Intruders now can possibly access …