Defense in depth added to Malicious Activities Simulation Tools (MAST)
dc.contributor.advisor | Singh, Gurminder | |
dc.contributor.advisor | Gibson, John | |
dc.contributor.author | Farber, Adam M. | |
dc.contributor.author | Rawls, Robert A. | |
dc.date | Sep-15 | |
dc.date.accessioned | 2015-11-06T18:22:14Z | |
dc.date.available | 2015-11-06T18:22:14Z | |
dc.date.issued | 2015-09 | |
dc.identifier.uri | http://hdl.handle.net/10945/47254 | |
dc.description.abstract | With its ever-increasing reliance upon computers and networks in all facets of operation and administration, the U.S. military is becoming increasingly vulnerable to computer and network-based threats. Military technicians’ ability to prevent and mitigate these threats is a skill that must be learned and practiced; for this reason, the Malicious Activities Simulation Tool (MAST) was created. The ongoing training required to defend networks and ensure DOD network policies are implemented correctly is costly and time consuming. A solution was needed to facilitate training system operators and administrators in potentially inauspicious environments, and to be adaptable to emerging threats. Since the proposed solution is on local systems with communication traveling over untrusted networks, a defense in depth plan ensures no undue consequences occur during MAST use. | en_US |
dc.description.uri | http://archive.org/details/defenseindepthdd1094547254 | |
dc.publisher | Monterey, California: Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | Defense in depth added to Malicious Activities Simulation Tools (MAST) | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Computer Science | |
dc.contributor.department | Computer Science | en_US |
dc.subject.author | MAST | en_US |
dc.subject.author | SSL / TLS | en_US |
dc.subject.author | digital signature | en_US |
dc.subject.author | Malicious Activity Simulation Tool | en_US |
dc.subject.author | defense in depth | en_US |
dc.description.service | Lieutenant, United States Navy | en_US |
etd.thesisdegree.name | Master of Science in Computer Science | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.