ebook img

Is hypertext a solution to implementing an ADP security program in DON? : issues and problems. PDF

150 Pages·2.8 MB·en_US
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Is hypertext a solution to implementing an ADP security program in DON? : issues and problems.

NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS HYPERTEXTA SOLUTION TO IS IMPLEMENTING AN ADP SECURITY PROGRAM IN DON? ISSUES AND PROBLEMS by RobertAndrew VanMeter September, 1991 Thesis Advisor: Tung Xuan Bui Approved for public release; distribution is unlimited TPSQOPP ULiaasuicu \_j SECURITYCLASSIFICATIONOFTHISPAGE REPORT DOCUMENTATION PAGE la REPORTSECURITYCLASSIFICATION 1b RESTRICTIVE MARKINGS UNCLASSIFIED 2a SECURITYCLASSIFICATIONAUTHORITY 3 DISTRIBUTION/AVAILABILITYOFREPORT Approvedfor publicrelease;distributionisunlimited. 2b DECLASSIFICATION/DOWNGRADINGSCHEDULE 4 PERFORMINGORGANIZATIONREPORTNUMBER(S) 5 MONITORINGORGANIZATIONREPORTNUMBER(S) 6a NAMEOFPERFORMINGORGANIZATION 6b OFFICESYMBOL 7a NAMEOFMONITORINGORGANIZATION NavalPostgraduateSchool (Ifapplicable) NavalPostgraduateSchool AS 6c ADDRESS(Dry, State,andZIPCode) 7b ADDRESS(Oty,State,andZIPCode) Monterey,CA 93943-5000 Monterey,CA 93943-5000 8a NAMEOFFUNDING/SPONSORING 8b OFFICESYMBOL 9 PROCUREMENTINSTRUMENTIDENTIFICATIONNUMBER ORGANIZATION (Ifapplicable) 8c ADDRESS(City,State,andZIPCode) 10 SOURCEOFFUNDINGNUMBERS ProgramElementNo ProjectNo WorkUnitAccession Number 11.TITLE (IncludeSecurityClassification) ISHYPERTEXTASOLUTIONTOIMPLEMENTINGANADPSECURITYPROGRAMINDON?ISSUESANDPROBLEMS 12 PERSONALAUTHOR(S) VanMeterRobertA. 13a TYPEOFREPORT 13b TIMECOVERED 14 DATEOF REPORT(year,month,day) 15 PAGECOUNT Master'sThesis From To 1991 .SEPTEMBER 141 16 SUPPLEMENTARYNOTATION TheviewsexpressedinthisthesisarethoseoftheauthoranddonotreflecttheofficialpolicyorpositionoftheDepartmentofDefenseortheU.S. Government. 17 COSATICODES 18 SUBJECTTERMS(continueonreverseifnecessaryandidentifybyblocknumber) FIELD GROUP SUBGROUP Hypertext,Hypermedia,CAI,ADPSecurity 19 ABSTRACT(continueonreverseifnecessaryandidentifybyblocknumber) Thegoalofthisthesisistoprovideanoverviewofhypertexttodetermineitsfeasibilityforresolvingsomeoftheproblemscurrentlyfacingnewly assignedandinexperiencedADPsecurityofficers.TheproclivitywithinDODforusingdocumentsinvirtuallyeveryfacetofworksuggeststhat hypertexthasapromisingfutureintheDOD.ToimplementanADPsecurityprogramintheNavy,theinformationpresentedintheDONAIS SecurityGuidelines shouldbecarefullyselectedandfilteredtoderiveatool thatprovidesaneffectiveandcircumstance-shapedsourceof information,guidance andreference.Fromadesignstandpoint,itisimportanttointegratehypertexttechnologywithothercomputerbasedtools - suchasexpertsystemsandsimulationmodels -- tofullyexploitthepotentialofthisnewtechnology. 20 DISTRIBUTION/AVAILABILITYOFABSTRACT 21 ABSTRACTSECURITYCLASSIFICATION FKuNCtASSIHED/UNLtMITED J SAMEASREPORT J OTICUSERS Unclassified 22a NAMEOFRESPONSIBLE INDIVIDUAL 22b TELEPHONE (IncludeAreacode) 22c OFFICE SYMBOL TungXuanBui 4086462630 AS/Bd DD FORM 1473,84 MAR 83APReditionmaybeused untilexhausted SECURITYCLASSIFICATIONOF THISPAGE Allothereditionsareobsolete Unclassified Approved for public release; distribution is unlimited Is Hypertext a Solution to Implementing an ADP Security Program in DON? Issues and Problems by RobertAndrew VanMeter Lieutenant Commander, United States Naval Reserve B.A., University ofRochester Submitted in partial fulfillment ofthe requirements for the degree of MASTER OF SCIENCE IN INFORMATION SYSTEMS from the NAVAL POSTGRADUATE SCHOOL September, 1991 ABSTRACT The goal of this thesis is to provide an overview of hypertext to determine its feasibility for resolving some of the problems currently facing newly assigned and inexperienced ADP security officers. The proclivity within DOD for using documents in virtually every facet of work suggests that hypertext has a promising future in the DOD. To implement an ADP security program in the Navy, the information presented in the DON AIS Security Guidelines should be carefully selected and filtered to derive a tool that provides an effective and circumstance-shaped source of information, guidance and reference. From a design standpoint, it is important to integrate hypertext technology with other computer based tools — — such as expert systems and simulation models to fully exploit the potential of this new technology. 111 .. JJMIt TABLE OF CONTENTS I INTRODUCTION 1 . A. OBJECTIVES 1 B. BACKGROUND 1 C. THE RESEARCH QUESTION 3 D. SCOPE AND LIMITATIONS 3 E. RESEARCH METHODOLOGY 4 F. ORGANIZATION OF THE STUDY 4 BACKGROUND 11 6 . A. INTRODUCTION 6 B. A NEW SECURITY OFFICER'S DILEMMA 6 C. ISSUES AND RECOMMENDATIONS 13 III. OVERVIEW OF HYPERTEXT 20 A. DEFINITIONS 20 1. Definition of Hypertext 20 2 Hypermedia 24 B. A BRIEF HISTORY OF HYPERTEXT 24 C. HYPERTEXT ARCHITECTURE 27 1. Basic Architecture 27 2. Links 29 3 Nodes 35 iv

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.