Counterintelligence through malicious code analysis
Murphy, Edmond J.
MetadataShow full item record
As computer network technology continues to grow, so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online presence, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses' network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year, billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever increasing number of vulnerable computers on the Internet, the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.
Showing items related by title, author, creator and subject.
Wasek, Christopher J. (Monterey, California: Naval Postgraduate School, 2016-09);Cloud computing has quickly revolutionized computing practices of organizations, to include the Department of Defense. However, security concerns over co-location attacks have arisen from the consolidation inherent in ...
Sellers, Kristin R. (Monterey, California: Naval Postgraduate School, 2016-09);Computer systems continue to be at risk of attack by malicious software that are attached to email. Email has been determined to be the cause of 80% of computer virus infections. Millions of dollars are lost yearly due to ...
Cheifetz, Aaron A. (Monterey, California. Naval Postgraduate School, 2004-03);This thesis investigates the effect that acquisition reform has had on small business participation in the Federal contracting arena. As a result of the transformation of the Federal acquisition process through acquisition ...