Security Engineering

In the last while I’ve had some people ask me about getting into the field of Information Security and the related certifications. This is a difficult question to answer since the field of Information Security is large with many areas of specialization. Not all the areas of specialization are technical...
more...

Off-Path TCP Sequence Number Inference Attack (CVE-2016-5696)

In the last couple of weeks there has been a lot of articles and discussion on the Off-Path TCP attack. This attack is made possible by a vulnerability introduced into the Linux TCP stack that leaks information regarding TCP connections. There has also been a number of articles with ominous...
more...

Multifactor Authentication

Looking at the long line up of data breaches with user creditials being dumped on the Internet, it would seem using multifactor authentication for your cloud based services might be a good idea. Gmail has been using Google Authenticator for quite some time now. Most cloud based services uses the...
more...

A Systems Approach to Information Security

When looking at an Information System there are 3 contact points where users (and attackers) interact with a system. Any of one or a combination of these contact points can be exploited by an attacker to gain unauthorized access to information. The 3 contact points includes the hardware, software and...
more...