Cybersecurity

Business Continuity Analysis

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a...

Nov 28 · 12 min read >
Business Continuity

An analysis of different data sources used in a forensics investigation

This article provides an overview of four different data sources used in various forensics investigations. The first source includes...

Nov 25 · 13 min read >
Data Sources

DNS Rebinding and Intrusion Detection with Contextual Signatures

This article summarizes and analyzes discussion from two different articles on the subjects of DNS Rebinding and the use of...

Feb 2 · 8 min read >
dns rebinding

Mitigating DoS or Distributed DoS (DDoS) attacks

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of...

Jan 16 · 9 min read >
denial of service

Operating Systems Security: Protection Measures Analysis

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and...

Oct 25 · 12 min read >
Operating Systems Security

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government...

Mar 31 · 9 min read >

Mobile Cybersecurity Policies in the Private and Public Sector

“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved...

Mar 26 · 10 min read >

Cybercrime: Law Enforcement and E-Government Transnational Issues

During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the...

Feb 17 · 11 min read >
Cybercrime