TagAcademic Papers

Moving Target Defense (MTD)

M

Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and intellectual property. In recent years, we have seen the increase of cyber-attacks and breaches to the point that they have become common news worldwide. As systems have grown in complexity with increased capacity to store large amounts of data, so to...

Business Continuity Analysis

B

This is post 12 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

An analysis of different data sources used in a forensics investigation

A

This is post 11 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

DNS Rebinding and Intrusion Detection with Contextual Signatures

D

This is post 10 of 10 in the series “Intrusion Detection” TCP Congestion Control Installing Wireshark on Mac OS X (Yosemite) What are Rogue Access Points? Two Common Router Security Threats Modern Application Frameworks, Legacy Browsers and Security Implications What are Covert Channels? Mobile Considerations in Network Security Architecture Common Bluetooth Vulnerabilities to be...

Mitigating DoS or Distributed DoS (DDoS) attacks

M

This is post 9 of 10 in the series “Intrusion Detection” TCP Congestion Control Installing Wireshark on Mac OS X (Yosemite) What are Rogue Access Points? Two Common Router Security Threats Modern Application Frameworks, Legacy Browsers and Security Implications What are Covert Channels? Mobile Considerations in Network Security Architecture Common Bluetooth Vulnerabilities to be Aware...

Operating Systems Security: Protection Measures Analysis

O

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and more importantly a dependency that we cannot break. In the workplace the Internet has become a part of our day to day lives. We rely on instant communication with our co-workers, friends and colleagues as well as access to a multitude of information at our fingertips. Children from younger...

Curriculum Mapping for Expeditionary Learning

C

Curriculum Mapping is the process of documenting lessons, activities and assessment methods used within different grade levels and classes in an educational institution.  Expeditionary Learning (EL) is a style of teaching that involves the students in experiences and problem-solving activities.  This paper explores the intersection of these two educational theories and addresses how pedagogical...

Backwards Design

B

Backwards design is a methodology used to develop curriculum, which promotes the identification of learning results at the start of the design process.  Wiggins and McTighe defined this term as part of their Understanding by Design (UbD) framework.  Backwards design is not a new concept, it has been around for a long time and this paper explores some of the underlying research behind Wiggins and...

Hacktivism, Anonymous, and the Bureau of Justice Statistics

H

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.

Health Services and Challenges facing the Low-Literacy Population

H

In the United States, a large proportion of the population falls into the category of having low literacy skills.  “A long-awaited federal study finds that an estimated 32 million adults in the USA — about one in seven — are saddled with such low literacy skills that it would be tough for them to read anything more challenging than a children’s picture book or to understand a...

Cybercrime: Law Enforcement and E-Government Transnational Issues

C

During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the many cyber threats that are continuing to dominate the news cycles. Just days prior to the President’s speech, eighteen people were charged in a massive credit card fraud ring. The Associated Press (2013) described it as a “sprawling international scam that duped credit-rating...

Cybersecurity as a Public Good

C

Over the last decade, the boom of the Internet has had a major impact on the way we interact with other individuals and business entities.  Products and services have become available at the touch of a button and access to vast amounts of information has become available to anyone with a direct connection to the web.  Much correspondence, which was traditionally mailed through the...

Human Cognition Factors in Online Messaging

H

In a hypothetical study, the Interaction Design and Information Architecture (IDIA) department at the University of Baltimore decided to promote their Humans Computers and Cognition (IDIA 640) course to prospective students already enrolled in the program and to those interested in the field.  In order to foster interest in the program, it was decided that a banner or ticker should be deployed...

Evaluation of a Major News Website From a Human Cognitive Perspective

E

Over the last decade, a shift has occurred in the way many people access, read and watch current events and news.  From the traditional newspapers and scheduled television news programs, we have moved to a more dynamic interactive medium, which dispenses information in a real-time format.  News websites are a fairly young media; however they have evolved exponentially since the late 1990s to the...

Security of Information Systems Infrastructure of an International Airport

S

This is post 7 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...

Malicious Code Intrusion

M

This is post 2 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me