A cyber situational awareness model for network administrators
MetadataShow full item record
Although there are many well-established cyber security tools and techniques available to network administrators for managing and defining their systems, attackers still succeed in penetrating their systems. Defending these systems' confidentiality, integrity, and availability is the responsibility of network administrators; however, protecting these systems becomes more difficult when one considers the volume and velocity of data provided by many of these cyber security tools. Often this data may actually indicate a cyber-attack, but is hard to discern among the bulk of data provided. The purpose of this research is to propose a cyber situational awareness (CSA) model to provide network administrators with better situational awareness of cyber security threats to their systems. This research examines an established situational awareness model and surveys cyber security practices and tools to extend this knowledge to actual cyber situational awareness. This research further develops a model for CSA in three hierarchical levels: configurational awareness, operational awareness, and special conditions awareness. The research concludes that if network administrators manage their systems with awareness of these three levels, they would be able to decrease the amount of unnecessary data and focus on the most important information that can help them better guarantee cyber security of their systems.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Morgan, Mark R. (Monterey California. Naval Postgraduate School, 2013-09);There are significant gaps in the United States Navy Submarine Forces ability to integrate and manage Information Assurance requirements (IA), Information Technology (IT) manpower, End-to-End security, IT equipment, IT ...
Verification and Validation of the Malicious Activity Simulation Tool (MAST) for Network Administrator Training and Evaluation Neff, Justin M. (Monterey, California. Naval Postgraduate School, 2012-03);The DoD currently employs red teams to conduct network infiltration and security training for network administrators and operators. Red Teams provide the most realistic and thorough training to defend against real-world ...
Mapping, awareness, and virtualization network administrator training tool (MAVNATT) architecture and framework McBride, Daniel C. (Monterey, California: Naval Postgraduate School, 2015-06);Tactical networks are becoming more critical in maintaining centers of gravity for military operations as cyberspace becomes contested at all levels of war. As a result, the growth of network centric operations and increased ...