An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises

Approved for public release; distribution is unlimited === An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the en...

Full description

Bibliographic Details
Main Author: Sherman, Michael A.
Other Authors: Irvine, Cynthia E.
Format: Others
Published: Monterey, California. Naval Postgraduate School 2012
Subjects:
Online Access:http://hdl.handle.net/10945/1345
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-1345
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-13452017-05-24T16:07:02Z An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises Sherman, Michael A. Irvine, Cynthia E. Fulp, J. D. Naval Postgraduate School (U.S.). Computer Science Extranets (Computer networks) Cyberterrorism Approved for public release; distribution is unlimited An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the encryption of exercise traffic that transits the public network infrastructure. However, VPNs and the technologies and devices behind them are not yet widely understood. Research and evaluation of VPN solutions will identify those most conducive to supporting a cyber-exercise. Users demand a solution that is secure, reliable, and easy to employ. The research in this thesis applies directly to the selection and implementation of an optimal VPN solution to support cyber-exercises. Major, United States Marine Corps 2012-03-14T17:31:21Z 2012-03-14T17:31:21Z 2004-09 Thesis http://hdl.handle.net/10945/1345 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. xx, 164 p. : ill. (some col.) ; application/pdf Monterey, California. Naval Postgraduate School
collection NDLTD
format Others
sources NDLTD
topic Extranets (Computer networks)
Cyberterrorism
spellingShingle Extranets (Computer networks)
Cyberterrorism
Sherman, Michael A.
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
description Approved for public release; distribution is unlimited === An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the encryption of exercise traffic that transits the public network infrastructure. However, VPNs and the technologies and devices behind them are not yet widely understood. Research and evaluation of VPN solutions will identify those most conducive to supporting a cyber-exercise. Users demand a solution that is secure, reliable, and easy to employ. The research in this thesis applies directly to the selection and implementation of an optimal VPN solution to support cyber-exercises. === Major, United States Marine Corps
author2 Irvine, Cynthia E.
author_facet Irvine, Cynthia E.
Sherman, Michael A.
author Sherman, Michael A.
author_sort Sherman, Michael A.
title An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
title_short An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
title_full An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
title_fullStr An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
title_full_unstemmed An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
title_sort analysis of vpn solutions and best practices for use in conjunction with cyber attack and defend exercises
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/1345
work_keys_str_mv AT shermanmichaela ananalysisofvpnsolutionsandbestpracticesforuseinconjunctionwithcyberattackanddefendexercises
AT shermanmichaela analysisofvpnsolutionsandbestpracticesforuseinconjunctionwithcyberattackanddefendexercises
_version_ 1718452569786810368