Risks, Threats and Vulnerabilities

According to SANS (2009) attacks against websites and web applications constitute more than 60% of total attacks observed on the internet. The risk of attack is generally based on the probability that a threat of some kind will exploit a vulnerability or weakness in a system or network. In recent years risks have been taken more seriously with many businesses that conduct online activities. ...

February 6, 2013 · 2 min · 398 words · icarnaghan

Cybercrime vs Traditional Crime

“Eighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.” ...

February 5, 2013 · 3 min · 593 words · icarnaghan

Challenges Policy Makers face to Counter Cybercrime

Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect. They “wear business suits, have university degrees, and appear to be pillars of their communities.” In addition to this, because of the wide spread accessibility to the internet and communications, it makes it easier for these criminals to operate in groups spread across the globe. ...

February 4, 2013 · 3 min · 586 words · icarnaghan

Inside The Webb

For the last few years I have been maintaining insidethewebb.com, however unfortunately I have not had the time to put into this site that I originally hoped when I first took it over and have decided to close the site. ...

January 7, 2013 · 2 min · 275 words · icarnaghan

Altas Rubicon Exploratory Eye Tracking Research

In December 2012, an eye tracking study was conducted with six participants in order to test the overall usability of a commercially available curriculum mapping application called Atlas Rubicon. The results of this research helped determine some areas of interest that have helped shape the ExpeditionMapper project in terms of search, browse and general information retrieval. ...

December 10, 2012 · 1 min · 71 words · icarnaghan

Decision Tree Outline

The decision tree application is currently a work-in-progress. The main source files can be downloaded here: Source Files. The current demo is non-functional and only shows a subset of the application, which will be developed in the upcoming weeks: Demo Application (Work in progress) ...

July 15, 2012 · 2 min · 253 words · icarnaghan

Number and Password Problems

The following are my responses to a series of simple PHP problems (attached in the Word File). I needed to review Doyle (2010) chapters 9 and 10 which cover form submission and session variables in order to complete these exercises. I also leaned on chapter 18 which goes into depth on regular expressions to assist with pattern recognition. ...

July 6, 2012 · 2 min · 321 words · icarnaghan

More PHP String Functions

This week I rewrote one of the PHP tasks from earlier and created a new function to emulate the functionality of str_pad. The function I wrote accepts a text string parameter, length, a reverse parameter (for padding on left or right) and finally an optional symbol parameter to show where the padding is happening. In addition to this I have outlined what I am planning on developing for a Drupal module later in the semester. ...

June 17, 2012 · 4 min · 776 words · icarnaghan

Strings

PHP provides many different functions for manipulating strings. Some of the more common functions are provided here, however for a full listing of all the available string functions see http://www.php.net/manual/en/ref.strings.php. ...

June 16, 2012 · 4 min · 827 words · icarnaghan

PHP Language Basics

This week I have been focusing on the first few chapters of Doyle (2010), specifically on PHP language basics, decisions and loops and strings. ...

June 10, 2012 · 7 min · 1449 words · icarnaghan