• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
291

METHODOLOGY FOR THE OPTIMIZATION OF RESOURCES IN THE DETECTION OF COMPUTER FRAUD.

DUNN, THURMAN STANLEY. January 1982 (has links)
A methodology is proposed for optimizing the allocation of resources in the detection of computer fraud. The methodology consists of four major segments. First, a threat assessment is performed. A general threat assessment is provided which relies upon reported incidents of computer fraud. Then, recognizing the limitations of computer fraud reporting, a specific threat assessment technique is provided which is based entirely on the characteristics of a given computer system. Both the general and specific threat assessment techniques use a matrix approach which evaluates and assigns threat values by type of computer fraud and perpetrator. Second, a Detection Quotient is established which measures the effectiveness of computer fraud detection resource allocation for all of the possible combinations of computer fraud types and perpetrators. However, for many computer systems, the large number of possible resource allocation alternatives results in a Combinatorial Dilemma whereby the phenomenally large number of alternatives precludes comprehensive analysis. This leads to the third major segment of the dissertation, a General Solution to the Combinatorial Dilemma which ensures an alternative very near the optimum while evaluating only an extremely small percentage of possible alternatives. Fourth, a Resource Optimization Model is provided which, beginning with the results of the Threat Assessment, iteratively assigns varying levels of computer fraud detection resources to different fraud type and perpetrator combinations. Using the general solution to the Combinatorial Dilemma and the Detection Quotient as a measure of the effectiveness of each combination, the model produces a statistically defensible near optimum allocation of available resources to computer fraud detection. Also provided are the results of the research into reported cases of fraud in the form of a Typology. This Typology combines frequency of occurrence and dollar impact of reported cases of fraud into a measure of vulnerability for various types of fraud and perpetrator. Finally, an overview of investigative techniques and automated tools for evaluating the propriety of computer systems is provided.
292

An architectural framework for describing Supervisory Control and Data Acquisition (SCADA) systems

Ward, Michael P. 09 1900 (has links)
Approved for public release; distribution is unlimited / Two recent trends have raised concerns about the security and stability of Supervisory Control and Data Acquisition (SCADA) systems. The first is a move to define standard interfaces and communications protocols in support of cross-vendor compatibility and modularity. The second is a move to connect nodes in a SCADA system to open networks such as the Internet. Recent failures of critical infrastructure SCADA systems highlight these concerns. To ensure continued operations in times of crisis, SCADA systems, particularly those operating in our critical infrastructure, must be secured. Developing an abstract generic framework for defining and understanding SCADA systems is a necessary first step. A framework can provide the tools to understand the system's functions and capabilities, and how components in the system relate and interface with each other. This thesis examines and describes SCADA systems, their components, and commonly used communications protocols. It presents a matrix approach to describing and defining the features, functions and capabilities of a SCADA system. Two small SCADA systems, using industry standard components and simulating real world applications, were designed and constructed for this thesis to provide context for applying the matrix approach. / Captain, United States Marine Corps
293

An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system

Hart, Dennis 09 1900 (has links)
Approved for public release; distribution is unlimited / The unfortunate events of September 11, 2001 have caused a renewed effort to protect our Nation's Critical Infrastructures. SCADA systems are relied upon in a large number of the sectors that make up the critical infrastructure and their importance was reinforced during the massive power outage that occurred in August 2003. Growing reliance upon the Internet has emphasized the vulnerability of SCADA system communications to cyber attack. Only through diligent and continuous vulnerability assessment and certification and accreditation of these systems will the United States be able to mitigate some of the vulnerabilities of these systems. A case study presented here has validated the need for continued focus in this area. This thesis consolidates some of the research that has already been done in the area of SCADA vulnerability assessment and applies it by developing an initial vulnerability assessment checklist for Department of the Navy systems. This checklist can and should also be used in the certification and accreditation of DoN SCADA systems. A promising technology was also discovered during this research that should be explored further to secure SCADA communications. This will be touched on briefly. / Major, United States Marine Corps
294

A formal analysis of the MLS LAN: TCB-to-TCBE, Session Status, and TCBE-to-Session Server Protocols

Craven, Daniel Shawn 09 1900 (has links)
Approved for public release; distribution is unlimited. / This thesis presents a formal analysis process and the results of applying that process to the MLS LAN: TCB-to- TCBE, Session Status, and TCBE-to-Session Server Protocols. The formal analysis process consists of several distinct stages: the creation of a detailed informal protocol description, analyzing that description to reveal assumptions and areas of interest not directly addressed in the protocol description, the transformation of that description and the related assumptions into a formal Strand Space representation, analyzing that representation to reveal assumptions and areas of interest, and concluding with an application of John Millen's automated Constraint Checker analysis tool to the Strand Space representations under an extremely limited set of conditions to prove certain protocol secrecy properties.
295

Installation, configuration and operational testing of a PKI certificate server and its supporting services

Kelly, Amanda M., Ambers, Vanessa P. 06 1900 (has links)
Approved for public release; distribution is unlimited / Public key infrastructure (PKI) was created to provide the basic services of confidentiality, authenticity, integrity and non-repudiation for sensitive information that may traverse public (un-trusted) networks. This thesis provides a brief description of the background and functional components of a PKI, and then "builds" a PKI to be used for research at the Naval Postgraduate School (NPS). Deficiencies of this PKI with respect to DoD PKI policy are delineated. The thesis addresses details of software selection, installation, configuration and operation; using Netscape's Certificate Management System as its Certificate Authority application of choice. The functionality of this PKI was validated by testing all major certificate lifecycle events (creation, archival, revocation, validation, etc.) All but two of these tests were successful-key escrow and revocation checking-and thus these two remain to be addressed by further work to make the NPS PKI fully functional. / First Lieutenant, United States Air Force / Lieutenant Commander, United States Navy
296

IPSec-based dynamic security services for the MYSEA environment / IPSec-based dynamic security services for the Monterey Security Architecture environment

Horn, John F. 06 1900 (has links)
It is recognized that security services in information-processing systems require access to finite resources in the execution of their duties. In response to the changing threats faced by a system and/or the availability of system resources, it is desired that the system be able to adjust its operational security policies automatically while continuing to function under an acceptable global security policy. This work involves the analysis and integration of a dynamic security service (DSS)-enabled IPsec implementation into a form ready for installation into the MYSEA environment. The feasibility of dynamic security services is demonstrated with support for secrecy and/or integrity protection of MLS server-to-end-user communication via a Trusted Path Extension. This is accomplished through the modulation of the IPsec security associations to adapt to operational needs. The result of this research is beneficial to Homeland Security, the Department of Defense, and the intelligence community by enabling remote distributed computing clients to operate in a secure manner that remains flexible to adapt to changing requirements of protection on the network and the availability of resources on terminating hosts. Furthermore, these methods can aid the realization of high-assurance edge-client connectivity in the creation and extension of the Global Information Grid (GIG).
297

A multi-agent system for tracking the intent of surface contacts in ports and waterways

Tan, Kok Soon Oliver. 03 1900 (has links)
Maritime security is especially critical for countries like Singapore, an island nation situated on the world's busiest shipping routes, whose economic prosperity is highly dependent on international trade from her busy port, petrochemical complexes and other high value units located along her coastline. This thesis borrows the ideas and techniques suggested for identifying air threats in the Air Defense Laboratory (ADL) and employ them to identify asymmetric maritime threats in port and waterways. Each surface track is monitored by a compound multi-agent system that comprise of the several intent models, each containing a nested multi-agent system. The attributes that define intent models of friendly, neutral, unknown and potentially hostile surface contacts are obtained from movement and communication protocols defined by the Vessel Traffic Information System (VTIS), maritime navigation rules and cues for surface warfare threat assessment. The underlying cognitive mechanism of the models is conceptual blending. The study includes a simulation of a mock VTS for the port of Singapore and surrounding waterways to test the ability of the models to compress data and information regarding multiple simulated surface contacts' into integration networks and then determine the surface contacts intent through the expansion of the integration networks.
298

Discipline, safety and security in schools: a challenge for school management

09 November 2010 (has links)
D.Ed. / Chapter one provided a general introduction and motivation for the study, and the challenges of discipline, safety and security (DSS) were also introduced. A general background to discipline, safety and security challenges was provided. The research problem and research aims were formulated and the research methodology was discussed. The focus of the research was clearly demarcated. The chapter was concluded by clarifying the concepts related to the research topic and outlining the division of chapters. In Chapter two a literature review was undertaken in order to determine the essence of DSS challenges and the extent of the challenges. In an analysis of the global perspectives in South America, Australia, and Botswana it became clear that DSS was a world wide phenomenon. Specific DSS challenges such as bullying, violence, substance abuse, guns and weapons, gangsterism, child abuse, HIV/AIDS and child-headed families were discussed. In Chapter three a discussion of possible intervention strategies which could be of assistance to the school management and the SGB in maintaining DSS in schools in schools was done. General characteristics of well-disciplined and safe schools were discussed as functional Codes of Conduct for learners, effective leadership, a positive school culture and climate, strong parental and community partnerships and effective communication. The following were identified and discussed as strategies for managing DSS challenges in schools: co-operative discipline, behaviour management, developing resilience in learners, developing self-esteem in learners, establishing a process for conflict resolution, co-operative learning use of physical environment, time management and learner motivation. The Boys and Girls Town educational model was discussed and important discipline, safety and security lessons for all stakeholders were clearly identified.
299

Les effets de la dangerosité sur la décision pénale

Harir, Said 20 December 2012 (has links)
Résumé non transmis / Summary not transmitted
300

Stream splitting in support of intrusion detection

Judd, John David 06 1900 (has links)
Approved for public release, distribution is unlimited / One of the most significant challenges with modern intrusion detection systems is the high rate of false alarms that they generate. In order to lower this rate, we propose to reduce the amount of traffic sent a given intrusion detection system via a filtering process termed stream splitting. Each packet arriving at the system is treated as belonging to a connection. Each connection is then assigned to a network stream. A network stream can then be sent to an analysis engine tailored specifically for that type of data. To demonstrate a stream-splitting capability, both an extendable multi-threaded architecture and prototype were developed. This system was tested to ensure the ability to capture traffic and found to be able to do so with minimal loss at network speeds up to 20 Mb/s, comparable to several open-source analysis programs. The stream splitter was also shown to be able to correctly implement a traffic separation scheme. / Ensign, United States Navy

Page generated in 0.5175 seconds