Remediating Third-Party Software Vulnerabilities on U.S. Army Information Systems
dc.contributor.advisor | Buettner, Raymond R. | |
dc.contributor.author | Sabovich, Jason R. | |
dc.contributor.author | Borst, James A. | |
dc.date | 12-Jun | |
dc.date.accessioned | 2012-07-30T23:16:06Z | |
dc.date.available | 2012-07-30T23:16:06Z | |
dc.date.issued | 2012-06 | |
dc.identifier.uri | http://hdl.handle.net/10945/7410 | |
dc.description.abstract | Information systems belonging to the DoD and U.S. Army experience cyber attacks on a daily basis. Increasingly, these attacks are targeting popular third-party applications, instead of focusing on vulnerabilities in Microsoft software. The DoD responded to this threat by adopting Citadel Hercules, which did not find a willing audience with the U.S. Army. Instead, the Army adopted Microsoft Systems Management Server (SMS), followed by System Center Configuration Manager (SCCM) 2007 to meet this threat. After more than five years, the rollout of SCCM to all organizations within the U.S. Army is still incomplete. This study provides an overview of the threats facing U.S. Army information systems and looks at how the Army has addressed this challenge in the past. Next, the study takes a system engineering approach to identifying an optimal tool for mitigating third-party vulnerabilities and suggests potential alternatives to SCCM. In addition, the study utilizes a cost benefit analysis approach to aid in evaluating the potential Return on Investment (ROI) provided by each tool. The purpose of this study is to answer the question What is the most optimal solution for mitigating vulnerabilities in third-party applications on U.S. Army information systems | en_US |
dc.description.uri | http://archive.org/details/remediatingthird109457410 | |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.title | Remediating Third-Party Software Vulnerabilities on U.S. Army Information Systems | en_US |
dc.type | Thesis | en_US |
dc.contributor.secondreader | Barreto, Albert | |
dc.contributor.secondreader | Cook, Glenn R. | |
dc.contributor.department | Information Technology Management | |
dc.contributor.department | Business Administration | |
dc.subject.author | Information Assurance Vulnerability Message (IAVM) | en_US |
dc.subject.author | Patch Management | en_US |
dc.subject.author | Third-Party Vulnerability Remediation | en_US |
dc.subject.author | System Center Configuration Manager (SCCM) | en_US |
dc.subject.author | LandWarNet (LWN) | en_US |
dc.subject.author | Information Assurance Vulnerability Alert (IAVA) | en_US |
dc.subject.author | Network Operations and Security Center (NOSC) | en_US |
dc.subject.author | Patching | en_US |
dc.subject.author | SysMan | en_US |
dc.description.service | Major, United States Army | en_US |
etd.thesisdegree.name | Master of Science in information Technology Management | en_US |
etd.thesisdegree.name | Master of Business Administration | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Information Sciences (IS) | en_US |
etd.thesisdegree.discipline | Graduate School of Business & Public Policy (GSBPP) | |
etd.thesisdegree.grantor | Naval Postgraduate School (U.S.) | en_US |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works. -
Systems Engineering Technical Reports