View Post

What is a Doctor of Science Degree?

In Education by Ian0 Comments

In 2014, I finally graduated after several years of intensive work from the University of Baltimore with a Doctor of Science degree in Information and Interaction Design. At the time I graduated people started asking me about my credential and whether or not it was the same as a Doctor of Philosophy (Ph.D.). What is a Doctor of Science? There are …

FacebookTwitterGoogle+PinterestLinkedInShare
View Post

Web Application Database Vulnerabilities to be Aware of

In Cybersecurity, Web Development by Ian1 Comment

The use of malicious code attacks against web applications and more specifically, web enabled databases, is on the rise and continues to be a greater threat as systems become more complicated and reliant on third party libraries and frameworks.  There are many different types of exploits and vulnerabilities associated with malicious code attacks which can potentially threaten the very databases …

View Post

SQL Injection Explained

In Cybersecurity, Web Development by Ian0 Comments

SQL injection has been a method of attacking databases through multiple tiers of application infrastructure for many years, MacVittie (2008).  SQL or Sequential Query Language is a database language used to interact with large quantities of data, typically stored in tables inside a Relational Database Management System (DBMS).  Each command using the SQL language typically generates a result set of …

View Post

Usable Security? User Friendly Factors

In Cybersecurity by Ian0 Comments

In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within the organization. He makes the case that security has to be simple and at the same time it has to minimize hassle (for the end user). He concludes that the root cause of this problem is …

View Post

Post Authentication Methods

In Cybersecurity by Ian0 Comments

A lot of time can be spent in an organization firming up authentication and access control systems to ensure greater levels of security to their network. All of this however is only one step to insuring a users credentials are not compromised. Considerations need to be made for post authentication. There are several things organizations can do to mitigate risk …

View Post

Unix Permissions For UMUC’s Nova Server Explained

In CMST 385, Web Development by Ian0 Comments

All files and directories created in a Unix environment such as Nova are assigned permissions based on the level of access available to different user groups. In order to understand permissions better, we will discuss users, groups and ownership. Users Unix is a multi-user operating system. It serves many users who have ownership or certain privileges of resources on the …

View Post

Drupal Development Environment in less than 10 Minutes

In Web Development by Ian5 Comments

Drupal can be installed on any number of environments, but since it was developed primarily to run on an Apache server with PHP and MySQL database, it makes sense to mimic this environment as much as possible in a development sandbox. There are LAMP applications for both Windows (WAMP / XAMP) and Mac OS (MAMP) which can serve as a Linux replacement, however …