Show simple item record

dc.contributor.advisorEagle, Christopher
dc.contributor.authorMurphy, Edmond J.
dc.date.accessioned2012-03-14T17:38:23Z
dc.date.available2012-03-14T17:38:23Z
dc.date.issued2007-06
dc.identifier.urihttps://hdl.handle.net/10945/3441
dc.description.abstractAs computer network technology continues to grow, so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online presence, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses' network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year, billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever increasing number of vulnerable computers on the Internet, the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.en_US
dc.description.urihttp://archive.org/details/counterintellige109453441
dc.format.extentxiv, 89 p. ;en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.subject.lcshComputer scienceen_US
dc.subject.lcshCommerceen_US
dc.subject.lcshIntelligence serviceen_US
dc.titleCounterintelligence through malicious code analysisen_US
dc.typeThesisen_US
dc.contributor.secondreaderDinolt, George
dc.contributor.corporateNaval Postgraduate School
dc.description.serviceFederal Cyber Corporation author (civilian).en_US
dc.identifier.oclc156992862
etd.thesisdegree.nameM.S.en_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineComputer Scienceen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.verifiednoen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record