• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A design comparison between IPv4 and IPv6 in the context of MYSEA, and implementation of an IPv6 MYSEA prototype

O'Neal, Matthew R. 06 1900 (has links)
Approved for public release, distribution is unlimited / Internet Protocol version six (IPv6), the next generation Internet Protocol, exists sparsely in today's world. However, as it gains popularity, it will grow into a vital part of the Internet and communications technology in general. Many large organizations, including the Department of Defense, are working toward deploying IPv6 in many varied applications. This thesis focuses on the design and implementation issues that accompany a migration from Internet Protocol version four (IPv4) to IPv6 in the Monterey Security Enhanced Architecture (MYSEA). The research for this thesis consists of two major parts: a functional comparison between the IPv6 and IPv4 designs, and a prototype implementation of MYSEA with IPv6. The current MYSEA prototype relies on a subset of Network Address Translation (NAT) functionality to support the network's operation; and, due to the fact that IPv6 has no native support for NAT, this work also requires the creation of a similar mechanism for IPv6. This thesis provides a preliminary examination of IPv6 in MYSEA, which is a necessary step in determining whether the new protocol will assist with or detract from the enforcement of MYSEA policies. / Ensign, United States Navy
2

Remote application support in a multilevel environment

Cooper, Robert C. 03 1900 (has links)
Approved for public release, distribution is unlimited / The use of specialized single-level networks in current military operations is inadequate to meet the need to share information envisioned by the Global Information Grid (GIG). Multilevel security (MLS) is a key Information Assurance enabler for the GIG vision. The Monterey Security Architecture (MYSEA), a distributed MLS network, eliminates the need to use separate equipment to connect to many networks at different classification levels. It allows users to view data at different sensitivities simultaneously. MYSEA also allows commercial software and hardware to be used at clients. To address the threat of residual data on the client after a user session change in security state, the MYSEA clients are required to be "stateless", i.e., there is no non-volatile writable memory. Hence the MYSEA server must provide the clients with the ability to execute server-resident client-side applications to access data at different security levels over the MLS Local Area Network (LAN). The MYSEA server currently does not support such capability. This thesis addresses this limitation. A new trusted process family is introduced to provide a pseudo-socket interface for the single level remote application to access the MLS LAN interface. Detailed design specifications were created to facilitate implementation of the remote application support. / Lieutenant, United States Navy
3

Um sistema para gest?o do conhecimento em amea?as, vulnerabilidades e seus efeitos

Massud, M?riam Valen?a 20 December 2005 (has links)
Made available in DSpace on 2014-12-17T14:56:05Z (GMT). No. of bitstreams: 1 MiriamVM.pdf: 955944 bytes, checksum: 0703348b1d68a5f32e8b6da9536de285 (MD5) Previous issue date: 2005-12-20 / Conselho Nacional de Desenvolvimento Cient?fico e Tecnol?gico / Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents / Ataques a dispositivos conectados em rede constituem um dos principais problemas relacionados ? confidencialidade das informa??es sens?veis e ao correto funcionamento dos sistemas de computa??o. Apesar da disponibilidade de ferramentas e de procedimentos que dificultam ou evitam a ocorr?ncia de incidentes de seguran?a, dispositivos de rede s?o atacados com sucesso utilizando-se estrat?gias aplicadas em eventos anteriores. O desconhecimento dos cen?rios nos quais esses ataques ocorreram contribui de maneira efetiva para o sucesso de novos ataques. O desenvolvimento de uma ferramenta que disponibilize esse tipo de informa??o ?, ent?o, de grande relev?ncia. Este trabalho apresenta um sistema de apoio ? gest?o de seguran?a corporativa para o armazenamento, a recupera??o e o aux?lio na composi??o de cen?rios de ataque e informa??es relacionadas. Se um incidente de seguran?a ocorrer em uma corpora??o, o especialista em seguran?a deve acessar o sistema para armazenar o cen?rio de ataque espec?fico. Este cen?rio, disponibilizado atrav?s de acesso controlado, deve ser estudado para que decis?es efetivas possam ser tomadas em casos semelhantes. Cen?rios de ataque evidenciam, al?m da estrat?gia utilizada pelo atacante, vulnerabilidades existentes em dispositivos. O acesso a este tipo de informa??o contribui para a eleva??o do n?vel de seguran?a dos dispositivos de rede de uma corpora??o e para a diminui??o do tempo de resposta ao incidente ocorrido

Page generated in 0.0383 seconds