This thesis describes challenges encountered during a year-long effort to improve the security of the 3,300 node administrative computer network at East Tennessee State University. The key remediation strategies used included employing the vulnerability scanner Nessus to profile the network, analyzing the scan results, and attempting to remove the most critical vulnerabilities found. The project succeeded in decreasing known “high” criticality vulnerabilities on campus by 26.1%, and confirmed four standard observations about the challenges of network administration: Vulnerability scanning is a lengthy task best performed in parallel and supported by automated data analysis.Securing a network is like trying to hit a moving target, due to an ...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
As computer networks continue to proliferate, the world\u27s dependence on a secure communication in...
The world is increasingly connected through a series of smart, connected systems such as smartphone ...
A three phase audit of East Tennessee State University\u27s administrative computer network was cond...
Vulnerability of computer systems in campus- wide network has been an issue for years, since network...
The purpose of this thesis is to increase awareness of network security in the office and at home by...
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechani...
Defenders of today's network are confronted with a large number of malicious activities such as spam...
Demand for effective network defense capabilities continues to increase as cyber attacks occur more ...
Security vulnerabilities pose a serious threat to computer systems and network infrastructures. This...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The society relies more and more on interconnected computers systems and distributed applications. T...
Doctor of PhilosophyDepartment of Computing and Information SciencesXinming (Simon) OuEnterprise net...
This report details a network penetration test in a simulated environment using GNS3, focusing on th...
2019 Summer.Includes bibliographical references.Defending large networked systems against rapidly ev...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
As computer networks continue to proliferate, the world\u27s dependence on a secure communication in...
The world is increasingly connected through a series of smart, connected systems such as smartphone ...
A three phase audit of East Tennessee State University\u27s administrative computer network was cond...
Vulnerability of computer systems in campus- wide network has been an issue for years, since network...
The purpose of this thesis is to increase awareness of network security in the office and at home by...
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechani...
Defenders of today's network are confronted with a large number of malicious activities such as spam...
Demand for effective network defense capabilities continues to increase as cyber attacks occur more ...
Security vulnerabilities pose a serious threat to computer systems and network infrastructures. This...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The society relies more and more on interconnected computers systems and distributed applications. T...
Doctor of PhilosophyDepartment of Computing and Information SciencesXinming (Simon) OuEnterprise net...
This report details a network penetration test in a simulated environment using GNS3, focusing on th...
2019 Summer.Includes bibliographical references.Defending large networked systems against rapidly ev...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
As computer networks continue to proliferate, the world\u27s dependence on a secure communication in...
The world is increasingly connected through a series of smart, connected systems such as smartphone ...