Ian Carnaghan

  http://www.carnaghan.com I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment. In my spare time I teach undergraduate classes in web development.

     



224 Stories by Ian Carnaghan

What are Advanced Persistent Threats?

Advanced Persistent Threats (APTs) are security threats that use advanced techniques to hide their attack from their target. They are commonly used to target...
2 1 min read

Helpful Resources for Understanding Web Application Security

As a developer, knowledge of web application security vulnerabilities is essential in order to build software that is both resilient to attacks and protected...
1 1 min read

Just What Exactly is Cybersecurity Anyway?

The word Cybersecurity is thrown around so much these days it has almost become overused in many conversations. This is due to the vast...
1 1 min read

What is an Asymmetric Threat?

The term asymmetric refers to an unequal balance or when thinking about threats, an unfair advantage to the perpetrator. Phillips, A (2012) provided an...
0 53 sec read

Sketching out your Perfect Website

You’ve decided it’s time to start solidifying ideas for your ideal website. You have no doubt spent countless hours in the planning phase identifying...
2 1 min read

Getting to Know Git, Github and Open Source

Fundamental to all modern web development is a strong foundational knowledge of version control. In recent years Git has emerged as the go-to choice...
1 2 min read

HTML5, CSS, and SEO Learning Resources

The HTML5 and CSS learning resources provided here supplement classroom materials for my CMST 386 class taught at the University of Maryland University College....
5 1 min read

Business Continuity Analysis

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a catastrophic event, whether this may...
2 12 min read

An analysis of different data sources used in a forensics investigation

This article provides an overview of four different data sources used in various forensics investigations. The first source includes system log files containing system...
1 13 min read

Forensics in Business Continuity Planning

Business continuity planning in any organization today must incorporate aspects of computer forensics in order to be sustainable. According to Majore, Yoo & Shon...
1 52 sec read

What is the Role of Computer Forensics?

Computer forensics can play a vital role in an organization’s recovery from a cyber attack. By properly following forensics processes carefully in the aftermath...
1 48 sec read

Malicious Code Detection

Malicious code detection is an ongoing obfuscation-deobfuscation game because of the nature of the malware or goals of the attacker. Detection of malicious executables...
0 1 min read