Using expert systems to conduct vulnerability assessments

Download
Author
Lankhorst, Debra A.
Date
1996-09Advisor
Jones, Carl R.
Second Reader
Vicente C. Garcia
Metadata
Show full item recordAbstract
An Information Warrior faces a complex and dynamic operating environment. To conduct an accurate Vulnerability Assessment and Risk Analysis of the enemy force (or a friendly force), a multitude of cause and effect relationships must be examined. Many times the person at the battle scene conducting the assessment may lack experience and/or knowledge, precluding a time-sensitive and effective assessment The author proposes a framework for a global network of expert systems and decision support systems to conduct the Vulnerability Assessments and maintain Information Warfare readiness through realistic training. The author also presents a Vulnerability Assessment and Risk Analysis heuristic with the objective of expanding the knowledge base and decision speed at the on-scene commander level. In achieving and implementing this global network, numerous benefits can be realized, including increased speed and efficiency in the receipt of intelligence information, thereby allowing for improved decision making capabilities. Since the technology and know-bow are already available, this vision of the global network is attainable and can be successfully implemented and operated.
Description
Information Technology Management
Collections
Related items
Showing items related by title, author, creator and subject.
-
RED TEAM IN A BOX (RTIB): DEVELOPING AUTOMATED TOOLS TO IDENTIFY, ASSESS, AND EXPOSE CYBERSECURITY VULNERABILITIES IN DEPARTMENT OF THE NAVY SYSTEMS
Plot, Joseph A. (Monterey, CA; Naval Postgraduate School, 2019-06);The U.S. Navy and Marine Corps manage a vast number of computer systems, both afloat and ashore, many of which are neither directly connected to an external Internet Protocol (IP) network nor updated regularly, but do ... -
A COMPUTATIONAL FRAMEWORK FOR OPTIMIZATION-BASED INTERDEPENDENT INFRASTRUCTURE ANALYSIS AND VULNERABILITY
Kuc, Matthias P. (Monterey, CA; Naval Postgraduate School, 2020-12);Civilian communities and military installations operate numerous critical infrastructure systems to deliver services like power, water, mobility, and communications to people and missions. The vulnerability of these systems ... -
An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system
Hart, Dennis (Monterey, California. Naval Postgraduate School, 2004-09);The unfortunate events of September 11, 2001 have caused a renewed effort to protect our Nation's Critical Infrastructures. SCADA systems are relied upon in a large number of the sectors that make up the critical infrastructure ...