View Post

Business Continuity Analysis

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 12 of 12 in the series Digital Forensics

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a catastrophic event, whether this may be a natural disaster or something more sinister. In recent years, we have seen the increase of cyber-attacks and breaches to the point that they have become common news worldwide. As systems have grown in complexity …

View Post

An analysis of different data sources used in a forensics investigation

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 11 of 12 in the series Digital Forensics

This article provides an overview of four different data sources used in various forensics investigations. The first source includes system log files containing system logs within the operating system as well as an overview of some tools that can be used in order to effectively understand these logs. File systems are also discussed including the effectiveness of metadata and their …

View Post

DNS Rebinding and Intrusion Detection with Contextual Signatures

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 10 of 10 in the series Intrusion Detection

This article summarizes and analyzes discussion from two different articles on the subjects of DNS Rebinding and the use of contextual signatures with Intrusion Detection Systems. DNS Rebinding is type of attack that was first documented in the mid 1990s. Since then it has become more prevalent through vulnerabilities inherent the way information is transmitted to and from a typical web …

View Post

Mitigating DoS or Distributed DoS (DDoS) attacks

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 9 of 10 in the series Intrusion Detection

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of the most challenging threats in modern times. While DoS has been around for some time, the methods used and practices of distributed botnets and automated scripts have continued to grow in sophistication. This paper survey’s three peer reviewed papers in the …

View Post

Curriculum Mapping for Expeditionary Learning

In Interaction Design by Ian CarnaghanLeave a Comment

Curriculum Mapping is the process of documenting lessons, activities and assessment methods used within different grade levels and classes in an educational institution.  Expeditionary Learning (EL) is a style of teaching that involves the students in experiences and problem-solving activities.  This paper explores the intersection of these two educational theories and addresses how pedagogical goals are met/not met by designing …

View Post

Backwards Design

In Education, Interaction Design by Ian CarnaghanLeave a Comment

Backwards design is a methodology used to develop curriculum, which promotes the identification of learning results at the start of the design process.  Wiggins and McTighe defined this term as part of their Understanding by Design (UbD) framework.  Backwards design is not a new concept, it has been around for a long time and this paper explores some of the …

View Post

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In Cybersecurity by Ian CarnaghanLeave a Comment

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.