Publications

This page showcases my technical publications and research reports in information technology, networking, cybersecurity, and artificial intelligence security.

Cyber Attacks and Defenses in Communication Networks

Jeramy Canals, Manuel Capiendo, Tariq Khan, Amaan Ahmed, Noah Steuart, Nicolas Seda

Published: October 2025

Type: Technical Publication / Academic Research Report

Length: 26 pages

Abstract:
Communication networks are the foundation of modern society; they allow the secure exchange of information across organizations, governments, and defense systems. But these networks face increasing risks from cyberattacks that exploit both technical flaws and human error. This report analyzes six major attack types: ransomware, zero-day exploits, phishing and spear phishing, SQL injection, DNS spoofing, and man-in-the-middle (MITM), and the related defenses designed to protect communication networks. Each section defines the attack, explains how it works, highlights real-world examples, and describes defense techniques such as patch management, network segmentation, encryption, multi-factor authentication, and user awareness training. The report shows how these attacks threaten data integrity, confidentiality, and availability within the Department of Defense (DoD) and other critical infrastructure networks. Overall, the report demonstrates that layered security combining technical controls, user education, and continuous monitoring is essential to maintaining reliable communication networks and national cybersecurity resilience.

Skills Demonstrated:

  • Network & cybersecurity analysis
  • Threat intelligence
  • Vulnerability research
  • Secure communications
  • DNS, SQL, and web security
  • Zero-trust architecture
  • Technical writing & research

Executive Summary:
This publication provides a detailed analysis of six major cyberattacks targeting communication networks, ransomware, zero-day exploits, phishing, SQL injection, DNS spoofing, and MITM. It includes attack flow diagrams, real-world case studies, and defense strategies. Visuals from pages 7, 10, 12, 18, 19, and 22 illustrate how attackers breach communication networks and how layered defense mechanisms stop them. The report highlights the importance of segmentation, encryption, patching, monitoring, and user training in defending national-security systems and critical-infrastructure networks.

Access the Publication:
Read Full Publication (PDF)

Citation:
Canals, J., Capiendo, M., Khan, T., Ahmed, A., Steuart, N., & Seda, N. (2025). Cyber Attacks and Defenses in Communication Networks.