Johnson, Marcus Winston (2024) Testing The Efficacy of Windows Defender Endpoint Security Control Using BAS Technology. Masters thesis, Dublin, National College of Ireland.
Preview |
PDF (Master of Science)
Download (1MB) | Preview |
Preview |
PDF (Configuration Manual)
Download (1MB) | Preview |
Abstract
Data breaches have become a widespread and expensive concern for enterprises worldwide in the quickly changing cyber threat landscape of today. This paper examines the substantial impact of misconfigurations, frequently caused by human errors and insufficient security measures, in contributing to catastrophic breaches. Utilising information from recent case studies and industry reports, such as the 2023 Data Breach Investigations Report, the research emphasises how misconfigurations enable unauthorised access and the exploitation of vulnerabilities. The study highlights the importance of ongoing and effective configuration management and continual security validation. It suggests utilising modern Breach and Attack Simulation (BAS) tools to automate and improve the process of testing security control capabilities. Moreover, the incorporation of AttackIQ's Flex platform, which provides complimentary and sophisticated adversary simulation and security control testing, is positioned as a cost-efficient and easily attainable solution for enhancing organisational security. This research places emphasis on the significance of proactive and well-informed security management. It offers practical suggestions for reducing the risks associated with misconfigurations and improving overall cybersecurity resilience. The purpose of the research is to provide guidance to cybersecurity professionals, policymakers, and organisations on how to implement steps to protect sensitive information and establish strong security frameworks to protect critical organizational assets.
Item Type: | Thesis (Masters) |
---|---|
Supervisors: | Name Email Aleburu, Joel UNSPECIFIED |
Subjects: | Q Science > QA Mathematics > Electronic computers. Computer science T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science Q Science > QA Mathematics > Computer software T Technology > T Technology (General) > Information Technology > Computer software Q Science > QA Mathematics > Computer software > Computer Security T Technology > T Technology (General) > Information Technology > Computer software > Computer Security |
Divisions: | School of Computing > Master of Science in Cyber Security |
Depositing User: | Ciara O'Brien |
Date Deposited: | 30 Jul 2025 09:38 |
Last Modified: | 30 Jul 2025 09:38 |
URI: | https://norma.ncirl.ie/id/eprint/8324 |
Actions (login required)
![]() |
View Item |