An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
Approved for public release; distribution is unlimited === An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the en...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10945/1345 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-1345 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-13452017-05-24T16:07:02Z An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises Sherman, Michael A. Irvine, Cynthia E. Fulp, J. D. Naval Postgraduate School (U.S.). Computer Science Extranets (Computer networks) Cyberterrorism Approved for public release; distribution is unlimited An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the encryption of exercise traffic that transits the public network infrastructure. However, VPNs and the technologies and devices behind them are not yet widely understood. Research and evaluation of VPN solutions will identify those most conducive to supporting a cyber-exercise. Users demand a solution that is secure, reliable, and easy to employ. The research in this thesis applies directly to the selection and implementation of an optimal VPN solution to support cyber-exercises. Major, United States Marine Corps 2012-03-14T17:31:21Z 2012-03-14T17:31:21Z 2004-09 Thesis http://hdl.handle.net/10945/1345 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. xx, 164 p. : ill. (some col.) ; application/pdf Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Extranets (Computer networks) Cyberterrorism |
spellingShingle |
Extranets (Computer networks) Cyberterrorism Sherman, Michael A. An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises |
description |
Approved for public release; distribution is unlimited === An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the encryption of exercise traffic that transits the public network infrastructure. However, VPNs and the technologies and devices behind them are not yet widely understood. Research and evaluation of VPN solutions will identify those most conducive to supporting a cyber-exercise. Users demand a solution that is secure, reliable, and easy to employ. The research in this thesis applies directly to the selection and implementation of an optimal VPN solution to support cyber-exercises. === Major, United States Marine Corps |
author2 |
Irvine, Cynthia E. |
author_facet |
Irvine, Cynthia E. Sherman, Michael A. |
author |
Sherman, Michael A. |
author_sort |
Sherman, Michael A. |
title |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises |
title_short |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises |
title_full |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises |
title_fullStr |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises |
title_full_unstemmed |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises |
title_sort |
analysis of vpn solutions and best practices for use in conjunction with cyber attack and defend exercises |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/1345 |
work_keys_str_mv |
AT shermanmichaela ananalysisofvpnsolutionsandbestpracticesforuseinconjunctionwithcyberattackanddefendexercises AT shermanmichaela analysisofvpnsolutionsandbestpracticesforuseinconjunctionwithcyberattackanddefendexercises |
_version_ |
1718452569786810368 |