Intrusion Detection Archives - Ian Carnaghan

TCP Congestion Control

So it’s that time of year again where I decided to enroll in another Cybersecurity class at UMUC. I...

Sep 18 · 1 min read >
TCP Congestion Control

Installing Wireshark on Mac OS X (Yosemite)

Wireshark is a software application for protocol and network traffic analysis, also known as a network sniffer. The application...

Sep 18 · 1 min read >
Wireshark mac os x yosemite

What are Rogue Access Points?

WiFi is commonly used both within organizations and in the general public. In recent years attackers have discovered ways...

Oct 11 · 1 min read >
rogue access points

Two Common Router Security Threats

Syn Flood or Denial of Service Attack Syn Flood attacks, often referred to as Denial of Service Attacks are...

Oct 11 · 1 min read >
router security threats

Modern Application Frameworks, Legacy Browsers and Security Implications

I was recently sent an article titled ‘How it feels to learn JavaScript in 2016’. Aguinaga, J. (2016).  It...

Nov 3 · 1 min read >
application frameworks security

What are Covert Channels?

A covert storage channel occurs when illegitimate hidden information or data is sent secretly via a legitimate communication channel....

Nov 5 · 1 min read >
covert channels

Mobile Considerations in Network Security Architecture

The use of mobile devices including policies and employee restrictions should be considered in any modern network security architecture....

Nov 19 · 1 min read >
mobile network security

Common Bluetooth Vulnerabilities to be Aware of

Bluetooth connectivity has grown immensely in popularity with mobile devices in the last number of years. The convenience factor...

Nov 23 · 1 min read >
common bluetooth vulnerabilities

Mitigating DoS or Distributed DoS (DDoS) attacks

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of...

Jan 16 · 9 min read >
denial of service