41 |
ASSESSING COMMON CONTROL DEFICIENCIES IN CMMC NON-COMPLIANT DOD CONTRACTORSVijayaraghavan Sundararajan (12980984) 05 July 2022 (has links)
<p> As cyber threats become highly damaging and complex, a new cybersecurity compliance certification model has been developed by the Department of Defense (DoD) to secure its Defense Industrial Base (DIB), and communication with its private partners. These partners or contractors are obligated by the Defense Federal Acquisition Regulations (DFARS) to be compliant with the latest standards in computer and data security. The Cybersecurity Maturity Model Certification (CMMC), and it is built upon existing DFARS 252.204-7012 and the NIST SP 800-171 controls. As of 2020, the DoD has incorporated DFARS and the National Institute of Standards and Technology (NIST) recommended security practices into what is now the CMMC. This thesis examines the most commonly identified security control deficiencies faced, the attacks mitigated by addressing these deficiencies, and suggested remediations, to 127 DoD contractors in order to bring them into compliance with the CMMC guidelines. By working with a compliance service provider, an analysis is done on how companies are undergoing and implementing important changes in their processes, to protect crucial information from ever-growing and looming cyber threats. </p>
|
42 |
Biometric Multi-modal User Authentication System based on Ensemble ClassifierAssaad, Firas Souhail January 2014 (has links)
No description available.
|
43 |
Adapting digital forensics processes for quantum computing : Insights from established industry guidelines supplemented by qualitative interviewsSvenblad, Tobias January 2024 (has links)
This thesis explores the evolving landscape of digital forensics in the context of quantum computing advancements, which challenge the foundational integrity of digital evidence. The focus is on the globally recognized digital forensic guidelines, NIST SP 800-86 and ISO/IEC 27037:2012, and their capacity to safeguard evidence against the unique capabilities of quantum systems. This thesis identifies vulnerabilities within existing forensic models through a comprehensive document analysis and expert interviews and proposes strategic modifications to enhance their robustness. Key findings suggest that traditional digital forensic methodologies, while robust under current technological standards, must address quantum data’s multi-state, entanglement, and no-cloning properties, which can fundamentally alter digital evidence. The thesis advocates for a paradigm shift in forensic processes to incorporate quantum-resistant techniques that ensure the integrity and admissibility of evidence. Additionally, it highlights the necessity for ongoing education and collaborative research to effectively adapt digital forensics to this new technological era. This research contributes to the theoretical framework and practical applications of digital forensics, aiming to future-proof forensic practices against the disruptive nature of quantum computing.
|
Page generated in 0.0401 seconds