Content area

Abstract

The United States government is mandated to use a risk management framework to assess its computing systems for cyber security. Part of this framework calls for vulnerability assessments on all government assets. The federal government has a large and diverse set of assets: Desktops, Laptops and servers in office building to integrated, purpose-built hybrid systems for warfighting platforms and space travel. Many of these systems employ a hybrid of technology commonly referred to as Platform Information Technology (PIT).

These PIT systems may have elements of traditional Information Technology infrastructure, but are limited in functionality, similar to industrial control systems and IoT (Internet of things) devices. To address the challenge of cyber-attacks, vulnerability assessments are one of the methods to evaluate a system for risk. These assessments can be automated through software tools or manually performed or a combination of both techniques.

The goal of this research was to quantify the efficacy of several methods – namely vulnerability assessments performed with software tools and those performed manually against published searchable databases. This study was a comparative analysis of vulnerability detection on non-traditional IT devices. The results revealed which methods, or combination of methods, have an advantage and to what degree.

Details

1010268
Business indexing term
Title
Efficacy of Vulnerability Detection Techniques in Non-Traditional Devices
Number of pages
136
Publication year
2025
Degree date
2025
School code
0183
Source
DAI-B 87/1(E), Dissertation Abstracts International
ISBN
9798290638935
Advisor
Committee member
Kocsis, Jin; Bhatt, Smriti; Smith, Stacia
University/institution
Purdue University
University location
United States -- Indiana
Degree
Dr.Tech.
Source type
Dissertation or Thesis
Language
English
Document type
Dissertation/Thesis
Dissertation/thesis number
32124047
ProQuest document ID
3254287042
Document URL
https://www.proquest.com/dissertations-theses/efficacy-vulnerability-detection-techniques-non/docview/3254287042/se-2?accountid=208611
Copyright
Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
Database
ProQuest One Academic