A CyberCIEGE scenario illustrating PKI interoperability issues through e-mail communications in a corporate environment
Ng, Teng Teng.
MetadataShow full item record
To help educate computer/network users and administrators on the complexities and potential implementation pitfalls of PKI, the work outlined in this thesis extended the CyberCIEGE computer security simulation game with additional PKI-related functionality. The research developed a scenario definition file for the CyberCIEGE game engine that supports a new game scenario that illustrates PKI concepts (e.g., cross-certification, certificate path processing and certificate revocation), configuration choices, and the security implications thereof. The game engine was enhanced to realistically model the parameters of an actual X.509 digital certificate. Test cases designed for this game extension verified that the scenario reasonably portrayed realistic PKI deployment issues and provided feedback consistent with real-world PKI implementations.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Falby, Naomi; Thompson, Michael F.; Irvine, Cynthia E. (IEEE, 2004-06-00);The Center for the Information Systems Studies and Research (CISR) at the Naval Postgraduate School has established a broad program in computer and network security education. The program, founded on a core in traditional ...
Mueller, David S. (Monterey, California. Naval Postgraduate School, 2005-09);Frequent media reports of the loss or compromise of data stored on computer systems indicate that attempts to educate users on proper computer security policies and procedures seem to be ineffective. In an effort to provide ...
CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network LaMore, Robert L. (Monterey, California. Naval Postgraduate School, 2004-06);User training in computer and network security is crucial to the survival of modern networks, yet the methods employed to train users often seem ineffective. One possible reason is that users are not fully engaged during ...