The United States military conducts operations on the sea, in the air, and on the land. As the wo... more The United States military conducts operations on the sea, in the air, and on the land. As the world flattens with the dawn of the cyber age, the United States Navy finds itself on the front lines of the emerging battlefield of cyberspace. Adapting to this new environment requires the development of a strategic campaign plan involving defensive and offensive capabilities. The research problem participating in this scenario uncovers the current implementation of naval tactics to defend against attacks and uncover vulnerabilities and deficiencies. The scope ranges from large scale state sponsored operations to the individual sailor viewing email on a government computer. The significance of the research problem investigates the strength of countermeasures throughout the fleet. Identifying these strengths give way to the weakness residing in the organization as a whole. The contribution to overall cybersecurity and defense is a diagnosis of shortfalls in the current naval infrastructure and offer corrective solutions through training and overall awareness to the problems at hand.
Every year, private industry and government agencies around the world fall victim to the theft of... more Every year, private industry and government agencies around the world fall victim to the theft of confidential information at the hands of cyber criminals, competing companies, and state sponsored departments. The impact of such data breaches can range from costly litigation to the total loss of customer faith. Given the realities of this hostile digital environment, properly implemented cyber security counter-measures are imperative to the continuity of business, and the protection of vital records. While large corporations and government possess the means to staff and equip entire departments dedicated to this task, small and medium sized businesses are left particularly vulnerable to targeted attacks. This paper seeks to perform an analysis of current open source solutions for intrusion detection/prevention so that small and medium-sized companies may integrate this important technology into their environment(s).
The United States military conducts operations on the sea, in the air, and on the land. As the wo... more The United States military conducts operations on the sea, in the air, and on the land. As the world flattens with the dawn of the cyber age, the United States Navy finds itself on the front lines of the emerging battlefield of cyberspace. Adapting to this new environment requires the development of a strategic campaign plan involving defensive and offensive capabilities. The research problem participating in this scenario uncovers the current implementation of naval tactics to defend against attacks and uncover vulnerabilities and deficiencies. The scope ranges from large scale state sponsored operations to the individual sailor viewing email on a government computer. The significance of the research problem investigates the strength of countermeasures throughout the fleet. Identifying these strengths give way to the weakness residing in the organization as a whole. The contribution to overall cybersecurity and defense is a diagnosis of shortfalls in the current naval infrastructure and offer corrective solutions through training and overall awareness to the problems at hand.
Every year, private industry and government agencies around the world fall victim to the theft of... more Every year, private industry and government agencies around the world fall victim to the theft of confidential information at the hands of cyber criminals, competing companies, and state sponsored departments. The impact of such data breaches can range from costly litigation to the total loss of customer faith. Given the realities of this hostile digital environment, properly implemented cyber security counter-measures are imperative to the continuity of business, and the protection of vital records. While large corporations and government possess the means to staff and equip entire departments dedicated to this task, small and medium sized businesses are left particularly vulnerable to targeted attacks. This paper seeks to perform an analysis of current open source solutions for intrusion detection/prevention so that small and medium-sized companies may integrate this important technology into their environment(s).
Uploads
Papers by Curt Collins