Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

A Framework And Exploration Of A Cybersecurity Education Escape Room, Justin Charles Snyder Jul 2018

A Framework And Exploration Of A Cybersecurity Education Escape Room, Justin Charles Snyder

Theses and Dissertations

This thesis presents a review of educational-escape-room literature followed by a design-oriented framework (the Snyder Escape Room Framework or SERF) and demonstrates the potential efficacy of escape-rooms in cybersecurity education. Several authors have proposed frameworks and guidelines for game and educational design regarding escape rooms. This work coalesces some of those ideas into a more substantial and comprehensive framework (SERF) that designers can use when developing educational escape rooms. The Snyder Escape Room Framework provides heuristics for goals and objectives, players, activities, context, trajectory design, and evaluation. Additionally, this work describes and analyzes the novel prototyped BYU GCC escape room …


An Analysis Of The Size And Impact Of Digital Footprints, Whitney Nielsen Maxwell Dec 2017

An Analysis Of The Size And Impact Of Digital Footprints, Whitney Nielsen Maxwell

Theses and Dissertations

Personal information available online is known as a digital footprint. While many have a digital footprint, few if any, know what it encapsulates or how to control it. Technology and personal information are becoming more intertwined as technology becomes more integrated with everyday activities. Personal information can be defined as details that apply to a person such as race or shopping habits. Shopping habits are considered personal information by many corporations who spend money to track, or even predict purchases of individuals, whereas more traditional forms of personal information are details like gender, birthdate, and home town. With a wide …


Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses Jun 2017

Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses

Theses and Dissertations

The goal of this research is to create a methodology that measures the robustness and effectiveness of forensic tools' ability to detect data hiding. First, an extensive search for any existing guidelines testing against data hiding was performed. After finding none, existing guidelines and frameworks in cybersecurity and cyber forensics were reviewed. Next, I created the methodology in this thesis. This methodology includes a set of steps that a user should take to evaluate a forensic tool. The methodology has been designed to be flexible and scalable so as new anti-forensic data hiding methods are discovered and developed, they can …


The Application Of Artificial Neural Networks For Prioritization Of Independent Variables Of A Discrete Event Simulation Model In A Manufacturing Environment, Rebecca Pires Dos Santos Jun 2017

The Application Of Artificial Neural Networks For Prioritization Of Independent Variables Of A Discrete Event Simulation Model In A Manufacturing Environment, Rebecca Pires Dos Santos

Theses and Dissertations

The high complexity existent in businesses has required managers to rely on accurate and up to date information. Over the years, many tools have been created to give support to decision makers, such as discrete event simulation and artificial neural networks. Both tools have been applied to improve business performance; however, most of the time they are used separately. This research aims to interpret artificial neural network models that are applied to the data generated by a simulation model and determine which inputs have the most impact on the output of a business. This would allow prioritization of the variables …


A Security Evaluation Methodology For Container Images, Brendan Michael Abbott Mar 2017

A Security Evaluation Methodology For Container Images, Brendan Michael Abbott

Theses and Dissertations

The goal of this research is to create a methodology that evaluates the security posture of container images and helps improve container security. This was done by first searching for any guidelines or standards that focus on container images and security. After finding none, I decided to create an evaluative methodology. The methodology is composed of actions that users should take to evaluate the security of a container image. The methodology was created through in-depth research on container images and the build instructions used to create them and is referred to as the Security Evaluation Methodology for Container Images. The …


Recognition Of Infrastructure Events Using Principal Component Analysis, Lane David Broadbent Dec 2016

Recognition Of Infrastructure Events Using Principal Component Analysis, Lane David Broadbent

Theses and Dissertations

Information Technology systems generate system log messages to allow for the monitoring of the system. In increasingly large and complex systems the volume of log data can overwhelm the analysts tasked with monitoring these systems. A system was developed that utilizes Principal Component Analysis to assist the analyst in the characterization of system health and events. Once trained, the system was able to accurately identify a state of heavy load on a device with a low false positive rate. The system was also able to accurately identify an error condition when trained on a single event. The method employed is …


Selecting Cloud Platform Services Based On Application Requirements, Bridger Ronald Larson Dec 2016

Selecting Cloud Platform Services Based On Application Requirements, Bridger Ronald Larson

Theses and Dissertations

As virtualization platforms or cloud computing have become more of a commodity, many more organizations have been utilizing them. Many organizations and technologies have emerged to fulfill those cloud needs. Cloud vendors provide similar services, but the differences can have significant impact on specific applications. Selecting the right provider is difficult and confusing because of the number of options. It can be difficult to determine which application characteristics will impact the choice of implementation. There has not been a concise process to select which cloud vendor and characteristics are best suited for the application requirements and organization requirements. This thesis …


Deriving System Vulnerabilities Using Log Analytics, Matthew Somers Higbee Nov 2015

Deriving System Vulnerabilities Using Log Analytics, Matthew Somers Higbee

Theses and Dissertations

System Administrators use many of the same tactics that are implemented by hackers to validate the security of their systems, such as port scanning and vulnerability scanning. Port scanning is slow, and can be highly inaccurate. After a scan is complete, the results of the scan must be cross checked with a vulnerability database to discover if any vulnerabilities are present. While these techniques are useful, they have severe limitations. System Administrators have full access to all of their machines. They should not have to rely exclusively on port scanning them from the outside of their machines to check for …