Intrusion Detection

TCP Congestion Control

So it’s that time of year again where I decided to enroll in another Cybersecurity class at UMUC. I will be posting snippets from...
Ian Carnaghan
1 min read

Installing Wireshark on Mac OS X (Yosemite)

Wireshark is a software application for protocol and network traffic analysis, also known as a network sniffer. The application can be downloaded for free...
Ian Carnaghan
1 min read

What are Rogue Access Points?

WiFi is commonly used both within organizations and in the general public. In recent years attackers have discovered ways to lure victims by using...
Ian Carnaghan
1 min read

Two Common Router Security Threats

Syn Flood or Denial of Service Attack Syn Flood attacks, often referred to as Denial of Service Attacks are caused through exploitation of the...
Ian Carnaghan
1 min read

Modern Application Frameworks, Legacy Browsers and Security Implications

I was recently sent an article titled ‘How it feels to learn JavaScript in 2016’. Aguinaga, J. (2016).  It is a somewhat amusing take...
Ian Carnaghan
1 min read

What are Covert Channels?

A covert storage channel occurs when illegitimate hidden information or data is sent secretly via a legitimate communication channel. The process occurs through the...
Ian Carnaghan
1 min read

Mobile Considerations in Network Security Architecture

The use of mobile devices including policies and employee restrictions should be considered in any modern network security architecture. Mobile devices are used commonly...
Ian Carnaghan
1 min read

Common Bluetooth Vulnerabilities to be Aware of

Bluetooth connectivity has grown immensely in popularity with mobile devices in the last number of years. The convenience factor of being able to have...
Ian Carnaghan
1 min read

Mitigating DoS or Distributed DoS (DDoS) attacks

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of the most challenging threats in...
Ian Carnaghan
9 min read