An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
Sherman, Michael A.
Irvine, Cynthia E.
Fulp, J. D.
MetadataShow full item record
An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the encryption of exercise traffic that transits the public network infrastructure. However, VPNs and the technologies and devices behind them are not yet widely understood. Research and evaluation of VPN solutions will identify those most conducive to supporting a cyber-exercise. Users demand a solution that is secure, reliable, and easy to employ. The research in this thesis applies directly to the selection and implementation of an optimal VPN solution to support cyber-exercises.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Babick, John P. (Monterey, California. Naval Postgraduate School, 2009-09);We introduce a new way to perform network analysis on critical infrastructure that is superior to Risk Analysis and Management for Critical Asset Protection (RAMCAP), currently used by the Department of Homeland Security. ...
Rose, Robert W. (Monterey California. Naval Postgraduate School, 2007-03);This thesis considers the problem of protecting an electrical power grid against a potential attack on its physical infrastructure. We develop a mathematical model, called â Defense of Known Interdictionsâ (DKI), that ...
Lavoy, Peter; Koh, Ernest (2004-01-20);This interactive tutorial in the form of a game reviews the following : Attributes of various classes of chemical and biological agents., How agent choice, timing of attack, wind speed and direction, and delivery means ...