CSEC 670 Archives - Ian Carnaghan
In the United States, a sizable amount of the overall federal budget is allocated to defense spending. The 2018 Defense Budget was signed into... Prior to any cyber attack, an organization should already have a solid crisis management plan and set of disaster recovery precautions in place. In... Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and intellectual property. In recent years,... The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity. We now see threats from all parts... Vulnerability assessments can be a very effective way of gathering information on an organizations internal security posture. The purpose is to accumulate data on... Advanced Persistent Threats (APTs) are security threats that use advanced techniques to hide their attack from their target. They are commonly used to target... The word Cybersecurity is thrown around so much these days it has almost become overused in many conversations. This is due to the vast... The term asymmetric refers to an unequal balance or when thinking about threats, an unfair advantage to the perpetrator. Phillips, A (2012) provided an...