View Post

Business Continuity Analysis

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 12 of 12 in the series Digital Forensics

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a catastrophic event, whether this may be a natural disaster or something more sinister. In recent years, we have seen the increase of cyber-attacks and breaches to the point that they have become common news worldwide. As systems have grown in complexity …

View Post

An analysis of different data sources used in a forensics investigation

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 11 of 12 in the series Digital Forensics

This article provides an overview of four different data sources used in various forensics investigations. The first source includes system log files containing system logs within the operating system as well as an overview of some tools that can be used in order to effectively understand these logs. File systems are also discussed including the effectiveness of metadata and their …

View Post

DNS Rebinding and Intrusion Detection with Contextual Signatures

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 10 of 10 in the series Intrusion Detection

This article summarizes and analyzes discussion from two different articles on the subjects of DNS Rebinding and the use of contextual signatures with Intrusion Detection Systems. DNS Rebinding is type of attack that was first documented in the mid 1990s. Since then it has become more prevalent through vulnerabilities inherent the way information is transmitted to and from a typical web …

View Post

Mitigating DoS or Distributed DoS (DDoS) attacks

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 9 of 10 in the series Intrusion Detection

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of the most challenging threats in modern times. While DoS has been around for some time, the methods used and practices of distributed botnets and automated scripts have continued to grow in sophistication. This paper survey’s three peer reviewed papers in the …

View Post

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In Cybersecurity by Ian CarnaghanLeave a Comment

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.

View Post

Cybercrime: Law Enforcement and E-Government Transnational Issues

In Cybersecurity by Ian CarnaghanLeave a Comment

During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the many cyber threats that are continuing to dominate the news cycles. Just days prior to the President’s speech, eighteen people were charged in a massive credit card fraud ring. The Associated Press (2013) described it as a “sprawling international scam that …

View Post

Security of Information Systems Infrastructure of an International Airport

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 3 of 7 in the series Cyberspace and Cybersecurity

As information systems in airports continue to grow in both size and complexity, so too do the risks associated with security vulnerabilities and threats.  Since the terrorist attacks on September 2001, airport security has substantially increased in day to day operations to address modern threats that the transportation infrastructure faces.  Terrorist attacks however are only a portion of the security …