A cyber situational awareness model for network administrators
Loading...
Authors
Karaarslan, Huseyin
Subjects
network administrator training
network management
network configuration
cyber situational awareness
operational awareness
configurational awareness
cyber situational awareness pyramid
cyber-security tools
cyber-security techniques
network management
network configuration
cyber situational awareness
operational awareness
configurational awareness
cyber situational awareness pyramid
cyber-security tools
cyber-security techniques
Advisors
Shaffer, Alan B.
Gibson, John
Date of Issue
2017-03
Date
Mar-17
Publisher
Monterey, CA; Naval Postgraduate School
Language
Abstract
Although there are many well-established cyber security tools and techniques available to network administrators for managing and defining their systems, attackers still succeed in penetrating their systems. Defending these systems' confidentiality, integrity, and availability is the responsibility of network administrators; however, protecting these systems becomes more difficult when one considers the volume and velocity of data provided by many of these cyber security tools. Often this data may actually indicate a cyber-attack, but is hard to discern among the bulk of data provided. The purpose of this research is to propose a cyber situational awareness (CSA) model to provide network administrators with better situational awareness of cyber security threats to their systems. This research examines an established situational awareness model and surveys cyber security practices and tools to extend this knowledge to actual cyber situational awareness. This research further develops a model for CSA in three hierarchical levels: configurational awareness, operational awareness, and special conditions awareness. The research concludes that if network administrators manage their systems with awareness of these three levels, they would be able to decrease the amount of unnecessary data and focus on the most important information that can help them better guarantee cyber security of their systems.
Type
Thesis
Description
Series/Report No
Department
Information Sciences (IS)
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
Copyright is reserved by the copyright owner.
