View Post

Challenges Policy Makers face to Counter Cybercrime

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 1 of 18 in the series Human Aspects in Cybersecurity

Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect.  They “wear business suits, have university degrees, and appear to be pillars of their communities.”  In addition to this, because of the wide spread accessibility to the internet and communications, it makes it easier for these criminals to operate in groups spread across the …

View Post

Security of Information Systems Infrastructure of an International Airport

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 3 of 7 in the series Cyberspace and Cybersecurity

As information systems in airports continue to grow in both size and complexity, so too do the risks associated with security vulnerabilities and threats.  Since the terrorist attacks on September 2001, airport security has substantially increased in day to day operations to address modern threats that the transportation infrastructure faces.  Terrorist attacks however are only a portion of the security …

View Post

Baseline Security Analyzer – Testing a Standard Installation of Windows Web Server 2008 R2

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 7 of 7 in the series Cyberspace and Cybersecurity

The objective of this exercise was to use Microsoft Baseline Security Analyzer (MBSA) to identify improper configurations and missing security updates that could lead to vulnerabilities.  The system this was tested on is a dedicated server located at Core Networks (http://www.corenetworks.com).  The server is used to host small business websites, from freelance web development work.  Up until recently a shared …

View Post

Security Concerns with Outsourcing IT Services

In Cybersecurity by Ian Carnaghan8 Comments

This entry is part 5 of 7 in the series Cyberspace and Cybersecurity

Outsourcing has become very common in recent years, especially in the field of Information Technology. So that companies can focus more on their core business, it makes sense to outsource many of their IT services and work to external organizations. In addition to this, quite often outsourcing can provide a cheaper means of labor if sent off shore, which enables …

View Post

What exactly is Cyberspace and Cybersecurity?

In Cybersecurity by Ian Carnaghan8 Comments

This entry is part 4 of 7 in the series Cyberspace and Cybersecurity

There has been a lot of buzz around the web in recent years regarding information assurance and cybersecurity especially with an increasing trend in cyber attacks and intrusions.  UMUC just recently started several cybersecurity degree and certificate programs in the fall of 2010.  Over the next few weeks articles will be posted here related to cybersecurity, starting with answering the …

View Post

Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 6 of 7 in the series Cyberspace and Cybersecurity

The objective of this exercise was to use the various password cracking tools available in the Cain and Abel software application and to determine the efficiency and effectiveness of each technique.  The following user accounts were created for testing purposes.  The first user account had a relatively easy to break password and the two that followed had slightly more complex …

View Post

Malicious Code Intrusion

In Cybersecurity by Ian Carnaghan1 Comment

This entry is part 2 of 7 in the series Cyberspace and Cybersecurity

The last decade has seen a noticeable shift of commercial application development from in-house computer software to the web browser in the form of web applications. Many company web sites today have evolved from small collections of informational pages to a combination of massive database driven applications for sales, marketing, finance, extranets and customer relationship management systems.

View Post

New Cybersecurity Programs begin Second Semester at UMUC

In Cybersecurity by Ian Carnaghan1 Comment

The University of Maryland University College (UMUC) is getting ready to begin its second semester of offering their new Cybersecurity programs, which opened to students in the fall of 2010. Two masters programs as well as an additional specialization in one of their existing information technology degrees were introduced last semester, along with an undergraduate program.

View Post

Government Cybersecurity Initiative for a Universal Internet ID

In Cybersecurity by Ian Carnaghan4 Comments

This entry is part 1 of 7 in the series Cyberspace and Cybersecurity

The U.S. Commerce Department has been handed the authority from the Whitehouse to create an Internet ID for Americans as one of the latest efforts in Cybersecurity policy.  The idea is that everyone would have one secure login to access many services online to increase security and privacy and reduce the need to remember numerous passwords.

View Post

Cybersecurity Masters Degree

In Cybersecurity by Ian CarnaghanLeave a Comment

Cybersecurity is an interesting, challenging and exciting field for those who wish to pursue a career in I.T. security, cybersecurity analysts, digital forensic experts and many others. The University of Maryland University College (UMUC) recently announced several new degree programs beginning this fall, 2010 in the field of Cybersecurity.