For the past several weeks, this blog has served as a means of fulfilling an academic requirement, and as a means of personal learning and growth. Primarily, I wrote about current events and topics that I found of interest that needed more researching or understanding. The majority of these posts were focused on security issuesContinue reading “Week Ten – Final Blog Post- Analysis”
Tag Archives: Malware
Week Eight – Uncommon Languages as a Security Bypass
Typical organizational security measures include signature, or even context recognition to identify malware inside the network. Attackers, forever creative, have begun to utilize less common languages to either write their malware, or for use as a file dropper to write the malware to the disk or into memory. There are several reasons why an attackerContinue reading “Week Eight – Uncommon Languages as a Security Bypass”
Week Seven – Cyber Security Regulation
Regulations are often a love-hate relationship in most industries. However they have been shown to have a positive impact in new or changing markets, especially those that fail to improve at a pace necessary for protection of growth of the industry. Cybersecurity is no exception. On July 20th, the Transportation Security Administration with the helpContinue reading “Week Seven – Cyber Security Regulation”
Week Six – The Importance of System Relevance
As humans we naturally age, and as expected so do information systems, software, techniques and their associated networks. This system aging can become a problem for organizations who neglect to dedicate enough resources to advancing their systems and keeping them up to date. This is even more important due to the rapid pace in whichContinue reading “Week Six – The Importance of System Relevance”
Week 2 -DNS Sinkholes
While researching the use of honeypots, I came across the term sinkholes. One of the best ways to increase understanding of any subject is to examine various components with which they are associated. So, what are DNS sinkholes? How are they implemented and what are their uses? In order to answer this question, we mustContinue reading “Week 2 -DNS Sinkholes”