• Assured Identity for The Cloud

      Daniels, Jeff (2011-09-22)
      It has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloud It has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloudIt has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloudIt has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloudIt has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloudcomputing, and a prototype built using interoperable cloud and virtualization technologies. The research supports the 2011 U.S. Federal Cloud Computing Strategy as well as the Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC) initiative. The dissertation research contributes to the body of knowledge in systems management, security, cloud computing and virtualization.
    • The effect of password management procedures on the entropy of user selected passwords.

      Enamait, John D (2012-05-21)
      Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak and susceptible to attack. As a result of attacks targeting alphanumeric passwords, different authentication methods have been proposed. Nonetheless, traditional alphanumeric-based passwords remain the most common form of user authentication and are expected to remain so for the foreseeable future. This study provided empirical data to determine if the entropy of user-selected passwords was affected by the use of password management software. This research also provided data to determine if efforts to increase user-awareness of password strength affected the selection of passwords. The research results revealed that the use of a password management application resulted in an increase in average password entropy, but at a level that was not significant. The research results also indicated that the use of a password management application when coupled with electronic secondary information awareness efforts did result in a significant increase in average password entropy. The research results further illustrated that the use of a password management application when coupled with verbal secondary information awareness efforts also resulted in a significant increase in average password entropy. Finally, this investigation determined that the use of password management software together with electronic and verbal secondary information user-awareness efforts resulted in an increase in password entropy.