View Post

Three Must Have Security Policies In 2018

In Cybersecurity by Ian CarnaghanLeave a Comment

The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity.  We now see threats from all parts of the global. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level? Cybersecurity threats continue to rise year after year and the problem continues grow due …

View Post

Vulnerability Assessments

In Cybersecurity by Ian CarnaghanLeave a Comment

Vulnerability assessments can be a very effective way of gathering information on an organizations internal security posture. The purpose is to accumulate data on any weaknesses revealed that should be proactively mitigated to prevent exploitation. There are a number of tools that can be used to carry out vulnerability assessments. Typically, a software-based tools are used to scan a selected …

View Post

Open “Window” For Personal Data Theft

In Cybersecurity by thetechverse.netLeave a Comment

Another day has come, the sun has risen once more and… the hackers have found once again a new way to snick up to your personal data and files… It seems as this perpetual game will keep on going forever and ever as it is a rather clever and efficient way to snick through other peoples personal data (photos, files, …

View Post

What are Advanced Persistent Threats?

In Cybersecurity by Ian Carnaghan2 Comments

Advanced Persistent Threats (APTs) are security threats that use advanced techniques to hide their attack from their target. They are commonly used to target specific information in high-profile companies and governments. APTs usually follow a long-term strategy of attack in order to gather information from the breached system. There have been many examples of APTs over the years targeting well …

View Post

Just What Exactly is Cybersecurity Anyway?

In Cybersecurity by Ian Carnaghan1 Comment

The word Cybersecurity is thrown around so much these days it has almost become overused in many conversations. This is due to the vast number of topics associated with its meaning. So how can we define it better? Traditionally Cybersecurity has described as a process for securing information or assets owned by governments, organizations, and individual people. The term itself …

View Post

What is an Asymmetric Threat?

In Cybersecurity by Ian CarnaghanLeave a Comment

The term asymmetric refers to an unequal balance or when thinking about threats, an unfair advantage to the perpetrator. Phillips, A (2012) provided an excellent overview of what an asymmetric threat is. He described attacks of this nature to be undetectable, and once occurred, impossible to determine its origin. Rubin (2007) further elaborates on this concept by defining the term …

View Post

Business Continuity Analysis

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 12 of 12 in the series Digital Forensics

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a catastrophic event, whether this may be a natural disaster or something more sinister. In recent years, we have seen the increase of cyber-attacks and breaches to the point that they have become common news worldwide. As systems have grown in complexity …

View Post

An analysis of different data sources used in a forensics investigation

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 11 of 12 in the series Digital Forensics

This article provides an overview of four different data sources used in various forensics investigations. The first source includes system log files containing system logs within the operating system as well as an overview of some tools that can be used in order to effectively understand these logs. File systems are also discussed including the effectiveness of metadata and their …

View Post

Forensics in Business Continuity Planning

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 10 of 12 in the series Digital Forensics

Business continuity planning in any organization today must incorporate aspects of computer forensics in order to be sustainable. According to Majore, Yoo & Shon (2014) in their article on secure and reliable electronic record management, over 90% of records created today are electronic. In addition to this electronic records require a greater amount of maintenance due to their volatility and …