View Post

What is an Asymmetric Threat?

In Cybersecurity by Ian CarnaghanLeave a Comment

The term asymmetric refers to an unequal balance or when thinking about threats, an unfair advantage to the perpetrator. Phillips, A (2012) provided an excellent overview of what an asymmetric threat is. He described attacks of this nature to be undetectable, and once occurred, impossible to determine its origin. Rubin (2007) further elaborates on this concept by defining the term …

View Post

Sketching out your Perfect Website

In CMST 386, Web Design, Web Development by Ian Carnaghan1 Comment

You’ve decided it’s time to start solidifying ideas for your ideal website. You have no doubt spent countless hours in the planning phase identifying your target audience, design considerations, and of course you have a solid idea of your overall content strategy. If you haven’t, then do yourself a favor and take a look at The Complete Guide to Building Your …

View Post

Getting to Know Git, Github and Open Source

In CMST 386, Web Development by Ian CarnaghanLeave a Comment

Fundamental to all modern web development is a strong foundational knowledge of version control. In recent years Git has emerged as the go-to choice for many developers and continues to gain popularity. Github is a platform that uses Git for source control. It provides an environment that encourages and fosters community open source development. It is a great platform to …

View Post

HTML5, CSS, and SEO Learning Resources

In CMST 386, Web Development by Ian Carnaghan1 Comment

The HTML5 and CSS learning resources provided here supplement classroom materials for my CMST 386 class taught at the University of Maryland University College. Please report any broken links in the LEO classroom. If you have any  suggestions for additional resources that could be added here, let me know. To access some of these resources you will need to sign …

View Post

Business Continuity Analysis

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 12 of 12 in the series Digital Forensics

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a catastrophic event, whether this may be a natural disaster or something more sinister. In recent years, we have seen the increase of cyber-attacks and breaches to the point that they have become common news worldwide. As systems have grown in complexity …

View Post

An analysis of different data sources used in a forensics investigation

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 11 of 12 in the series Digital Forensics

This article provides an overview of four different data sources used in various forensics investigations. The first source includes system log files containing system logs within the operating system as well as an overview of some tools that can be used in order to effectively understand these logs. File systems are also discussed including the effectiveness of metadata and their …

View Post

Forensics in Business Continuity Planning

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 10 of 12 in the series Digital Forensics

Business continuity planning in any organization today must incorporate aspects of computer forensics in order to be sustainable. According to Majore, Yoo & Shon (2014) in their article on secure and reliable electronic record management, over 90% of records created today are electronic. In addition to this electronic records require a greater amount of maintenance due to their volatility and …

View Post

What is the Role of Computer Forensics?

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 9 of 12 in the series Digital Forensics

Computer forensics can play a vital role in an organization’s recovery from a cyber attack. By properly following forensics processes carefully in the aftermath of an attack, recovery can begin to play out. According to Čisar & Maravić Čisar (2012), in accordance with digital forensic analysis methodology three processes are essential, which include preparation, identification, and analysis. It is during …

View Post

Malicious Code Detection

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 8 of 12 in the series Digital Forensics

Malicious code detection is an ongoing obfuscation-deobfuscation game because of the nature of the malware or goals of the attacker. Detection of malicious executables known to an investigator is usually performed using signature-based techniques. In their forensic research article, Rozenberg, Guides, Elovici and Fledel (2010) made the point that obfuscated or encrypted files could not easily be detected this way. …

View Post

Remote Access Trojans

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 7 of 12 in the series Digital Forensics

Remote Access Trojans have become a serious security concern as hackers have developed more sophisticated code that can be installed and hidden on a target system, unknown to the user. According to UMUC (n.d.) Remote Access Trojans are a form of backdoor that can provide unauthorized access and use of digital assets on a victim’s computer system. It essentially masquerades …