Defense in depth added to Malicious Activities Simulation Tools (MAST)
Farber, Adam M.
Rawls, Robert A.
MetadataShow full item record
With its ever-increasing reliance upon computers and networks in all facets of operation and administration, the U.S. military is becoming increasingly vulnerable to computer and network-based threats. Military technicians’ ability to prevent and mitigate these threats is a skill that must be learned and practiced; for this reason, the Malicious Activities Simulation Tool (MAST) was created. The ongoing training required to defend networks and ensure DOD network policies are implemented correctly is costly and time consuming. A solution was needed to facilitate training system operators and administrators in potentially inauspicious environments, and to be adaptable to emerging threats. Since the proposed solution is on local systems with communication traveling over untrusted networks, a defense in depth plan ensures no undue consequences occur during MAST use.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Hafsia, Raouf. (2001-03);Ad hoc wireless networks are decentralized networks whose members join and leave the network in an asynchronous manner and for short periods of time. Each node participating in the network acts both as host and a router ...
Alderson, David; Ubiquity Staff (Association for Computing Machinery (ACM), 2009-08);Since Duncan Watts and Steve Strogatz published “Collective Dynamics of Small-World Networks” in Nature in 1998, there has been an explosion of interest in mathematical models of large networks, leading to numerous research ...
Torner, Linus P. (Monterey, California: Naval Postgraduate School, 2015-09);Several recent terrorist attacks in Western countries have highlighted the need for strategies to disrupt dark networks, and social network analysis (SNA) has proven to be a useful tool for analyzing network structure and ...