Cybersecurity

What are Rogue Access Points?

WiFi is commonly used both within organizations and in the general public. In recent years attackers have discovered ways to lure victims by using...
Ian Carnaghan
1 min read

Installing Wireshark on Mac OS X (Yosemite)

Wireshark is a software application for protocol and network traffic analysis, also known as a network sniffer. The application can be downloaded for free...
Ian Carnaghan
1 min read

TCP Congestion Control

So it’s that time of year again where I decided to enroll in another Cybersecurity class at UMUC. I will be posting snippets from...
Ian Carnaghan
1 min read

Web Application Database Vulnerabilities to be Aware of

The use of malicious code attacks against web applications and more specifically, web enabled databases, is on the rise and continues to be a...
Ian Carnaghan
1 min read

SQL Injection Explained

SQL injection has been a method of attacking databases through multiple tiers of application infrastructure for many years, MacVittie (2008).  SQL or Sequential Query...
Ian Carnaghan
1 min read

Operating Systems Security: Protection Measures Analysis

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and more importantly a dependency that...
Ian Carnaghan
12 min read

Usable Security? User Friendly Factors

In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within...
Ian Carnaghan
1 min read

Post Authentication Methods

A lot of time can be spent in an organization firming up authentication and access control systems to ensure greater levels of security to...
Ian Carnaghan
1 min read

Freedom of Information Act (FOIA) Quick Overview

Lately I’ve been carrying out some work involving the Freedom of Information Act (FOIA). There is tons of information about FOIA on the web...
Ian Carnaghan
2 min read

More on Limiting Damage to Information Assets

Establishing and enforcing policies that limit employee access to sensitive data and IT systems are one of the most effective mitigation strategies against a...
Ian Carnaghan
1 min read

Managing Access to Information Resources

Security breaches caused by internal employees, consultants, business partners and any other individual or group of individuals that have privileged access to certain parts...
Ian Carnaghan
1 min read

Honeypots: To Lure or Not To Lure

Honeypots are sometimes used as an active defense mechanism for network security and provide a means for targeting attackers and recovering forensic evidence.  A...
Ian Carnaghan
1 min read