Cybersecurity Capstone

CSEC 670

United States Defense Contractors and Cybersecurity Challenges

In the United States, a sizable amount of the overall federal budget is allocated to defense spending. The 2018 Defense Budget was signed into...
Ian Carnaghan
7 min read

Management Actions that Must Happen Prior to a Cyber…

Prior to any cyber attack, an organization should already have a solid crisis management plan and set of disaster recovery precautions in place. In...
Ian Carnaghan
1 min read

Moving Target Defense (MTD)

Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and intellectual property. In recent years,...
Ian Carnaghan
13 min read

Three Must Have Security Policies In 2018

The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity.  We now see threats from all parts...
Ian Carnaghan
1 min read

Vulnerability Assessments

Vulnerability assessments can be a very effective way of gathering information on an organizations internal security posture. The purpose is to accumulate data on...
Ian Carnaghan
56 sec read

What are Advanced Persistent Threats?

Advanced Persistent Threats (APTs) are security threats that use advanced techniques to hide their attack from their target. They are commonly used to target...
Ian Carnaghan
1 min read

Just What Exactly is Cybersecurity Anyway?

The word Cybersecurity is thrown around so much these days it has almost become overused in many conversations. This is due to the vast...
Ian Carnaghan
1 min read

What is an Asymmetric Threat?

The term asymmetric refers to an unequal balance or when thinking about threats, an unfair advantage to the perpetrator. Phillips, A (2012) provided an...
Ian Carnaghan
53 sec read