Academic Papers

Moving Target Defense (MTD)

Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and intellectual property. In recent years,...
Ian Carnaghan
13 min read

Business Continuity Analysis

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a catastrophic event, whether this may...
Ian Carnaghan
12 min read

An analysis of different data sources used in a…

This article provides an overview of four different data sources used in various forensics investigations. The first source includes system log files containing system...
Ian Carnaghan
13 min read

DNS Rebinding and Intrusion Detection with Contextual Signatures

This article summarizes and analyzes discussion from two different articles on the subjects of DNS Rebinding and the use of contextual signatures with Intrusion Detection...
Ian Carnaghan
8 min read

Mitigating DoS or Distributed DoS (DDoS) attacks

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of the most challenging threats in...
Ian Carnaghan
9 min read

Operating Systems Security: Protection Measures Analysis

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and more importantly a dependency that...
Ian Carnaghan
12 min read

Curriculum Mapping for Expeditionary Learning

Curriculum Mapping is the process of documenting lessons, activities and assessment methods used within different grade levels and classes in an educational institution.  Expeditionary...
Ian Carnaghan
14 min read

Backwards Design

Backwards design is a methodology used to develop curriculum, which promotes the identification of learning results at the start of the design process.  Wiggins...
Ian Carnaghan
15 min read

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur...
Ian Carnaghan
9 min read