View Post

Intrusion Detection

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 1 of 8 in the series Prevention and Protection Strategies

Intrusion Detection is the process of monitoring an information system in order to determine if any action is being performed with malicious or otherwise cause that may negatively affect its availability, confidentiality or integrity of data contained within.  In order to get started with intrusion detection, it is important to first of all gain an understanding of what an intrusion …

Share
View Post

Honeypots: To Lure or Not To Lure

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 2 of 8 in the series Prevention and Protection Strategies

Honeypots are sometimes used as an active defense mechanism for network security and provide a means for targeting attackers and recovering forensic evidence.  A typical honeypot traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system.

Share
View Post

Managing Access to Information Resources

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 3 of 8 in the series Prevention and Protection Strategies

Security breaches caused by internal employees, consultants, business partners and any other individual or group of individuals that have privileged access to certain parts of the network remain one of the highest threats to digital assets.  In an article about the employee life cycle and identification of internal organizational threats, Conrad et al (2009) asserts that within an organization, the …

Share
View Post

More on Limiting Damage to Information Assets

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 4 of 8 in the series Prevention and Protection Strategies

Establishing and enforcing policies that limit employee access to sensitive data and IT systems are one of the most effective mitigation strategies against a malicious insider (Brancik, 2008).  There are a number of strategies that organizations can implement in order to better secure their digital assets. 

Share
View Post

Post Authentication Methods

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 5 of 8 in the series Prevention and Protection Strategies

A lot of time can be spent in an organization firming up authentication and access control systems to ensure greater levels of security to their network. All of this however is only one step to insuring a users credentials are not compromised. Considerations need to be made for post authentication. There are several things organizations can do to mitigate risk …

Share
View Post

Usable Security? User Friendly Factors

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 6 of 8 in the series Prevention and Protection Strategies

In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within the organization. He makes the case that security has to be simple and at the same time it has to minimize hassle (for the end user). He concludes that the root cause of this problem is …

Share
View Post

SQL Injection Explained

In Cybersecurity, Web Development by Ian CarnaghanLeave a Comment

This entry is part 7 of 8 in the series Prevention and Protection Strategies

SQL injection has been a method of attacking databases through multiple tiers of application infrastructure for many years, MacVittie (2008).  SQL or Sequential Query Language is a database language used to interact with large quantities of data, typically stored in tables inside a Relational Database Management System (DBMS).  Each command using the SQL language typically generates a result set of …

Share
View Post

Web Application Database Vulnerabilities to be Aware of

In Cybersecurity, Web Development by Ian Carnaghan1 Comment

This entry is part 8 of 8 in the series Prevention and Protection Strategies

The use of malicious code attacks against web applications and more specifically, web enabled databases, is on the rise and continues to be a greater threat as systems become more complicated and reliant on third party libraries and frameworks.  There are many different types of exploits and vulnerabilities associated with malicious code attacks which can potentially threaten the very databases …

Share