Font Size: a A A

A model for computer network responses against identified intruders

Posted on:2002-03-25Degree:D.CSType:Dissertation
University:Colorado Technical UniversityCandidate:Liberto, Samuel MatthewFull Text:PDF
GTID:1468390011492816Subject:Computer Science
Abstract/Summary:
All facets of our society depend on and use information through the interconnection of information technology systems. However, the benefits of this information infrastructure must be weighed against the vulnerabilities created by allowing identified intruders into the network of information technology systems.; During the course of this research, a conceptual, national-level computer model was developed to help support an integrated defense against identified intruders into our nation's information infrastructure. The model developed from this research is based on a well-known and proven existing model that is used to integrate the software development environment at an organization. The new model was derived from the existing model to support computer network defense at a national level. Inputs to the new model were produced from an established approach used to dissect the process of computer network defense into its key components.; Several steps were used to validate the model developed from this research. The first step for validation was an appraisal technique to describe the model's usefulness. Next, the new model was linked to a national strategic-level vision and goal for computer network defense. Third, the model was validated through quantification. The new model was quantified by applying the information economics approach and compared with a theoretical organizational-level model. Finally, broad objectives and specific programs to implement the new model were described. These results and their conclusions are presented, as well as suggested areas where further research would be appropriate.
Keywords/Search Tags:Model, Computer network, Information, Identified
Related items