Cybersecurity

Moving Target Defense (MTD)

Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and intellectual property. In recent years,...
Ian Carnaghan
13 min read

Business Continuity Analysis

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a catastrophic event, whether this may...
Ian Carnaghan
12 min read

An analysis of different data sources used in a…

This article provides an overview of four different data sources used in various forensics investigations. The first source includes system log files containing system...
Ian Carnaghan
13 min read

DNS Rebinding and Intrusion Detection with Contextual Signatures

This article summarizes and analyzes discussion from two different articles on the subjects of DNS Rebinding and the use of contextual signatures with Intrusion Detection...
Ian Carnaghan
8 min read

Mitigating DoS or Distributed DoS (DDoS) attacks

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of the most challenging threats in...
Ian Carnaghan
9 min read

Operating Systems Security: Protection Measures Analysis

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and more importantly a dependency that...
Ian Carnaghan
12 min read

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur...
Ian Carnaghan
9 min read

Mobile Cybersecurity Policies in the Private and Public Sector

“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones...
Ian Carnaghan
10 min read

Cybercrime: Law Enforcement and E-Government Transnational Issues

During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the many cyber threats that are...
Ian Carnaghan
11 min read

Security of Information Systems Infrastructure of an International Airport

As information systems in airports continue to grow in both size and complexity, so too do the risks associated with security vulnerabilities and threats. ...
Ian Carnaghan
9 min read

Malicious Code Intrusion

The last decade has seen a noticeable shift of commercial application development from in-house computer software to the web browser in the form of...
Ian Carnaghan
12 min read