View Post

Government Cybersecurity Initiative for a Universal Internet ID

In Cybersecurity by Ian Carnaghan5 Comments

This entry is part 1 of 7 in the series Cyberspace and Cybersecurity

The U.S. Commerce Department has been handed the authority from the Whitehouse to create an Internet ID for Americans as one of the latest efforts in Cybersecurity policy.  The idea is that everyone would have one secure login to access many services online to increase security and privacy and reduce the need to remember numerous passwords.

Share
View Post

Malicious Code Intrusion

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 2 of 7 in the series Cyberspace and Cybersecurity

The last decade has seen a noticeable shift of commercial application development from in-house computer software to the web browser in the form of web applications. Many company web sites today have evolved from small collections of informational pages to a combination of massive database driven applications for sales, marketing, finance, extranets and customer relationship management systems.

Share
View Post

Security of Information Systems Infrastructure of an International Airport

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 3 of 7 in the series Cyberspace and Cybersecurity

As information systems in airports continue to grow in both size and complexity, so too do the risks associated with security vulnerabilities and threats.  Since the terrorist attacks on September 2001, airport security has substantially increased in day to day operations to address modern threats that the transportation infrastructure faces.  Terrorist attacks however are only a portion of the security …

Share
View Post

What exactly is Cyberspace and Cybersecurity?

In Cybersecurity by Ian Carnaghan9 Comments

This entry is part 4 of 7 in the series Cyberspace and Cybersecurity

There has been a lot of buzz around the web in recent years regarding information assurance and cybersecurity especially with an increasing trend in cyber attacks and intrusions.  UMUC just recently started several cybersecurity degree and certificate programs in the fall of 2010.  Over the next few weeks articles will be posted here related to cybersecurity, starting with answering the …

Share
View Post

Security Concerns with Outsourcing IT Services

In Cybersecurity by Ian Carnaghan8 Comments

This entry is part 5 of 7 in the series Cyberspace and Cybersecurity

Outsourcing has become very common in recent years, especially in the field of Information Technology. So that companies can focus more on their core business, it makes sense to outsource many of their IT services and work to external organizations. In addition to this, quite often outsourcing can provide a cheaper means of labor if sent off shore, which enables …

Share
View Post

Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 6 of 7 in the series Cyberspace and Cybersecurity

The objective of this exercise was to use the various password cracking tools available in the Cain and Abel software application and to determine the efficiency and effectiveness of each technique.  The following user accounts were created for testing purposes.  The first user account had a relatively easy to break password and the two that followed had slightly more complex …

Share
View Post

Baseline Security Analyzer – Testing a Standard Installation of Windows Web Server 2008 R2

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 7 of 7 in the series Cyberspace and Cybersecurity

The objective of this exercise was to use Microsoft Baseline Security Analyzer (MBSA) to identify improper configurations and missing security updates that could lead to vulnerabilities.  The system this was tested on is a dedicated server located at Core Networks (http://www.corenetworks.com).  The server is used to host small business websites, from freelance web development work.  Up until recently a shared …

Share