Development of an internet intrusion prevention tool

Download
Author
Anunciado, Dagohoy Hofilena.
Date
1997-12Advisor
Lundy, Bert
Broersma, Ron
Metadata
Show full item recordAbstract
This thesis explores the current shortcomings in computer and Internet security, and how the lack of user education in basic security concepts is detrimental to computer and network security. The use of cryptography and potentially expensive technical means to secure systems will fail when one neglects security education of users. The thesis addresses a portion of the security education problem by designing and developing a tool to educate users on the two major successful methods for penetrating a computer system, weak passwords and social engineering. The tool can teach users how to pick good passwords and the steps to take to prevent social engineering attacks. The tool consists of a tutorial and ends with an exam to test user comprehension concerning picking good passwords and preventing social engineering attacks
Collections
Related items
Showing items related by title, author, creator and subject.
-
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
Zviran, Moshe; Haga, William James (Monterey, California. Naval Postgraduate School, 1990-06); NPS-54-90-014Various mechanisms for authenticating users of computer-based information systems have been proposed. These include traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and ... -
Cognitive passwords: the key for effective access control
Hulsey, John Douglas (Monterey, California. Naval Postgraduate School, 1989-03);Passwords are a commonly used method of access control for computer systems. Traditional passwords have been found to be inadequate. Passwords are generated from two sources: users and computer systems. User-selected ... -
Passwords Security: An Exploratory Study
Zviran, Moshe; Haga, William James (Monterey, California. Naval Postgraduate School, 1990-05); NPS-54-90-011One of the most common control mechanisms for authenticating users of computer based information systems is the use of passwords. However, despite the widespread use of passwords, only little attention has been given to ...