Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer security (5)
- Computer networks--Security measures (2)
- Cyberterrorism--Prevention (2)
- Data protection (2)
- Biometric identification (1)
-
- Computer network protocols (1)
- Computer networks -- Security measures (1)
- Computer security -- Study and teaching (1)
- Computer security--Management (1)
- Computer viruses (1)
- Computers--Access control--Passwords (1)
- Cryptography--Mathematical models (1)
- Cyberterrorism (1)
- Decision making (1)
- Human-computer interaction (1)
- Image processing--Digital techniques (1)
- Pattern recognition systems (1)
- United States. Air Force--Computer networks (1)
- United States. Air Force--Security measures (1)
- United States. Dept. of Defense--Computer networks (1)
- United States. National Security Agency--Computer networks--Security measures (1)
- Visual programming (Computer science) (1)
- Publication
Articles 1 - 10 of 10
Full-Text Articles in Physical Sciences and Mathematics
Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder
Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder
Theses and Dissertations
Information security is an issue that has increased in importance over the past decade. In this time both practitioner and academic circles have researched and developed practices and process to more effectively handle information security. Even with growth in these areas there has been little research conducted into how decision makers actually behave. This is problematic because decision makers in the Department of Defense have been observed exhibiting risk seeking behavior when making information security decisions that seemingly violate accepted norms. There are presently no models in the literature that provide sufficient insight into this phenomenon. This study used Prospect …
Early Warning And Prediction Of Internet Attacks And Exploits, Brian P. Zeitz
Early Warning And Prediction Of Internet Attacks And Exploits, Brian P. Zeitz
Theses and Dissertations
A safe, secure, and functional information network is vital in today’s Air Force net centric environment. Information is more critical today than it has ever been. As more operational functions are placed in cyber space and greater computing power becomes available to everyone, keeping these networks safe and secure is an almost unattainable task. Network security entails Intrusion Detection Security, but another form of security or “insecurity” is quickly gaining attention. Honeypots allow the black hat community to attack and penetrate non-production systems. By monitoring and studying these attacks, network defenders can develop better Information Assurance tactics, techniques and procedures …
Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel
Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel
Theses and Dissertations
The insider threat is a major concern for organizations. Open markets, technological advances, and the evolving definition of employee have exacerbated the insider threat. Insider threat research efforts are focusing on both prevention and detection techniques. However, recent security violation trends highlight the damage insider attacks cause organizations and illuminate why organizations and researchers must develop new approaches to this challenge. Although fruitful research is being conducted and new technologies are being applied to the insider threat problem, companies remain susceptible to the costly damage generated by insider threat actions. This research explored how visualization tools may be useful in …
Passwords: A Survey On Usage And Policy, Kurt W. Martinson
Passwords: A Survey On Usage And Policy, Kurt W. Martinson
Theses and Dissertations
Computer password use is on the rise. Passwords have become one of the primary authentication methods used today. It is because of their high use that organizations have started to place parameters on passwords. Are password restrictions a nuisance? What are some of the consequences that result as organizations place the burden of their computer security on passwords? This thesis analyzes the results of a survey instrument that was used to determine if individuals are using similar techniques or patterns when choosing or remembering their passwords. It also looks at how individuals feel about using passwords. In addition, the authors …
Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman
Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman
Theses and Dissertations
The Department of Defense (DoD) relies heavily on the Non-secure Internet Protocol Router Network (NIPRNET) to exchange information freely between departments, services, bases, posts, and ships. The NIPRNET is vulnerable to various attacks, to include physical and cyber attacks. One of the most frequently used cyber attacks by criminally motivated hackers is a Distributed Denial of Service (DDoS) attack. DDoS attacks can be used to exhaust network bandwidth and router processing capabilities, and as a leveraging tool for extortion. Border Gateway Protocol (BGP) black hole routing is a responsive defensive network technique for mitigating DDoS attacks. BGP black hole routing …
An Analysis Of Perturbed Quantization Steganography In The Spatial Domain, Matthew D. Spisak
An Analysis Of Perturbed Quantization Steganography In The Spatial Domain, Matthew D. Spisak
Theses and Dissertations
Steganography is a form of secret communication in which a message is hidden into a harmless cover object, concealing the actual existence of the message. Due to the potential abuse by criminals and terrorists, much research has also gone into the field of steganalysis - the art of detecting and deciphering a hidden message. As many novel steganographic hiding algorithms become publicly known, researchers exploit these methods by finding statistical irregularities between clean digital images and images containing hidden data. This creates an on-going race between the two fields and requires constant countermeasures on the part of steganographers in order …
An Analysis Of Biometric Technology As An Enabler To Information Assurance, Darren A. Deschaine
An Analysis Of Biometric Technology As An Enabler To Information Assurance, Darren A. Deschaine
Theses and Dissertations
The use of and dependence on, Information technology (IT) has grown tremendously in the last two decades. Still, some believe the United States is only in the infancy of this growth. This explosive growth has opened the door to capabilities that were only dreamed of in the past. As easy as it is to see how advantageous this technology is, it also is clear that with its advantages come distinct responsibilities and new problems that must be addressed. For instance, the minute one begins using information processing systems, the world of information assurance (IA) becomes far more complex. As a …
National Security Agency (Nsa) Systems And Network Attack Center (Snac) Security Guides Versus Known Worms, Matthew W. Sullivan
National Security Agency (Nsa) Systems And Network Attack Center (Snac) Security Guides Versus Known Worms, Matthew W. Sullivan
Theses and Dissertations
Internet worms impact Internet security around the world even though there are many defenses to prevent the damage they inflict. The National Security Agency (NSA) Systems and Network Attack Center (SNAC) publishes in-depth configuration guides to protect networks from intrusion; however, the effectiveness of these guides in preventing the spread of worms hasn't been studied. This thesis establishes how well the NSA SNAC guides protect against various worms and exploits compared to Microsoft patches alone. It also identifies the aspects of the configuration guidance that is most effective in the absence of patches and updates, against network worm and e-mail …
Computer Security: Investigating The Impact That Security Specific Education Has On Users’ Behaviour, Samuel David Jones
Computer Security: Investigating The Impact That Security Specific Education Has On Users’ Behaviour, Samuel David Jones
Theses : Honours
A lack in end-user awareness in computer security issues provides the rationale for this investigation. The research considers whether or not the provision of an educational package addressing computer security issues will improve awareness and transform behaviour of end-users in assessing and enacting appropriate responses in computer security situations. A group of twenty participants was studied in detail using a mixed methods research approach. The participants were drawn from a cross section of computer end-users, from elementary to advanced levels of computer literacy. Outcomes include a positive response to the provision of material, however human factors were found to be …
An Investigation Of Network Security Management Methods, Shamila Anuranga Ratnayake
An Investigation Of Network Security Management Methods, Shamila Anuranga Ratnayake
Theses : Honours
Network Management (NM) is concerned with reducing complexity and managing cost. The traditional NM tools and techniques are based on the Open System Interconnection (OSI) NM model. However, several drawbacks have been identified when managing a network using traditional NM tools (Sarkar & Verma, 2001). Network security is a major issue when managing a network. Even though the technology assists to reduce security risks, unless properly managed, the security measures may not do the job as expected. The State Model (SM) diagram is a new method, which may assists in managing the network. This new method may provide functionality not …