AuthorIan Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Helpful Resources for Understanding Web Application Security

H

As a developer, knowledge of web application security vulnerabilities is essential in order to build software that is both resilient to attacks and protected through a layered approach of defense. The cybersecurity landscape is constantly shifting, however a good understanding of the most common vulnerabilities is a great place to get started with security. Before reviewing the articles below, be...

Just What Exactly is Cybersecurity Anyway?

J

The word Cybersecurity is thrown around so much these days it has almost become overused in many conversations. This is due to the vast number of topics associated with its meaning. So how can we define it better? Traditionally Cybersecurity has described as a process for securing information or assets owned by governments, organizations, and individual people. The term itself can be considered a...

What is an Asymmetric Threat?

W

The term asymmetric refers to an unequal balance or when thinking about threats, an unfair advantage to the perpetrator. Phillips, A (2012) provided an excellent overview of what an asymmetric threat is. He described attacks of this nature to be undetectable, and once occurred, impossible to determine its origin. Rubin (2007) further elaborates on this concept by defining the term asymmetry as...

Sketching out your Perfect Website

S

You’ve decided it’s time to start solidifying ideas for your ideal website. You have no doubt spent countless hours in the planning phase identifying your target audience, design considerations, and of course you have a solid idea of your overall content strategy. If you haven’t, then do yourself a favor and take a look at The Complete Guide to Building Your Personal Brand, What...

Getting to Know Git, Github and Open Source

G

Fundamental to all modern web development is a strong foundational knowledge of version control. In recent years Git has emerged as the go-to choice for many developers and continues to gain popularity. Github is a platform that uses Git for source control. It provides an environment that encourages and fosters community open source development. It is a great platform to publish and use for...

HTML5, CSS, and SEO Learning Resources

H

The HTML5 and CSS learning resources provided here supplement classroom materials for my CMST 386 class taught at the University of Maryland University College. Please report any broken links in the LEO classroom. If you have any  suggestions for additional resources that could be added here, let me know. To access some of these resources you will need to sign up for a free account, which I...

Business Continuity Analysis

B

This is post 12 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

An analysis of different data sources used in a forensics investigation

A

This is post 11 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Forensics in Business Continuity Planning

F

This is post 10 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

What is the Role of Computer Forensics?

W

This is post 9 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Malicious Code Detection

M

This is post 8 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Remote Access Trojans

R

This is post 7 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Presenting Digital Evidence

P

This is post 6 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Confusion over Terminology

C

This is post 5 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Lessons Learned using Drupal’s Domain Access Module

L

Over the last few months my team has been developing microsites to accompany our main website. The requirements for these sites included having their own domain, theme and separate content. After reviewing options in Drupal 7, I decided the best approach given our situation was to use the Domain Access Module. The Domain Access Module provides a very solid and powerful framework for developing...

Data Hiding and Steganography

D

This is post 4 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Preparation Phase of a Digital Search

P

This is post 3 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Yet More Theft of Information Assets

Y

This is post 2 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Important Cybercrime Laws

I

This is post 1 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me