Applicability of Army automation security guidance to local area computer network security.
Ayres, Jeffrey D.
Brown, Thomas J.
Blakney, Peter J., Jr.
MetadataShow full item record
The U.S. Army Combat Developments Experimentation Center (USACDEC) Directorate of Information Management (DIM), Fort Ord, is currently involved with several network implementations, all at various stages of development, and wants adequate network security at an affordable price. During early stages of development they found almost no existing local area network (LAN) security guidance. This thesis does not look for a set or perfect LAN guidance solution, but develops a background for security considerations during the development of a network based on existing was supplied by USACDEC/DIM; all other (DOD, etc.) guidance was selected for review by USACDEC/DIM, but obtained elsewhere.
Approved for public release; distribution in unlimited.
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2012);IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Technology for Homeland Security: Best Papers. As the field of homeland defense and security expands and matures, the contributions from various disciplines become ...
Brown, Thomas L. (Monterey, California. Naval Postgraduate School, 1993-09);In recent years, computer networks have significantly increased in both complexity and number, and these networks are attractive targets for attack and intrusion. Unix networks being managed by the government and providing ...