Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand

dc.contributor.authorSteele, Aaron
dc.date.accessioned2009-07-21T23:22:13Z
dc.date.availableNO_RESTRICTIONen_US
dc.date.available2009-07-21T23:22:13Z
dc.date.issued2008
dc.description.abstractIn order to keep shared access computers secure and stable system administrators resort to locking down the computing environment in order to prevent intentional and unintentional damage by users. Skilled attackers are often able to break out of locked down computing environments and intentionally misuse shared access computers. This misuse has resulted in cases of mass identity theft and fraud, some of which have had an estimated cost ranging in millions. In order to determine if it is possible to break out of locked down computing environments an assessment method is required. Although a number of vulnerability assessment techniques exist, none of the existing techniques are sufficient for assessing locked down shared access computers. This is due to the existing techniques focusing on traditional, application specific, software vulnerabilities. Break out path vulnerabilities (which are exploited by attackers in order to break out of locked down environments) differ substantially from traditional vulnerabilities, and as a consequence are not easily discovered using existing techniques. Ontologies can be thought of as a modelling technique that can be used to capture expert knowledge about a domain of interest. The method for discovering break out paths in locked down computers can be considered expert knowledge in the domain of shared access computer security. This research proposes an ontology based assessment process for discovering break out path vulnerabilities in locked down shared access computers. The proposed approach is called the ontological lockdown assessment process. The ontological lockdown assessment process is implemented against a real world system and successfully identifies numerous break out path vulnerabilities.en_US
dc.identifier.urihttp://hdl.handle.net/10179/946
dc.language.isoenen_US
dc.publisherMassey Universityen_US
dc.rightsThe Authoren_US
dc.subjectComputer securityen_US
dc.subjectComputer vulnerabilityen_US
dc.subjectBreak-out path vulnerabilitiesen_US
dc.subjectShared accessen_US
dc.subject.otherFields of Research::280000 Information, Computing and Communication Sciences::280500 Data Format::280505 Data securityen_US
dc.titleOntological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealanden_US
dc.typeThesisen_US
massey.contributor.authorSteele, Aaron
thesis.degree.disciplineInformation Technologyen_US
thesis.degree.grantorMassey Universityen_US
thesis.degree.levelMastersen_US
thesis.degree.nameMaster of Science (M. Sc.)en_US
Files
Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
02whole.pdf
Size:
324.54 KB
Format:
Adobe Portable Document Format
Description:
Loading...
Thumbnail Image
Name:
01front.pdf
Size:
21.8 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
895 B
Format:
Item-specific license agreed upon to submission
Description: