Explore my cybersecurity research, ethical hacking work, programming projects, and academic papers.
Summary: This paper outlines the different types of hackers—with a focus on cybersecurity threats faced by academic institutions (Flyer College). It discusses ethical hacking, penetration testing, and security best practices, presenting a structured ethical hacking plan to mitigate threats and enhance cybersecurity defenses.
Key Topics Covered:
Relevant Course: INSY 46000 - Cybercrime Prevention Tools
Read PDFSummary: This report is a comprehensive risk management plan for Health Network Inc., focusing on IT security. It covers risk assessment, mitigation strategies, regulatory compliance (HIPAA, PCI DSS, HITECH Act), cybersecurity best practices, and business continuity planning (BCP) to protect sensitive data.
Key Topics Covered:
Relevant Course: INSY 35100 - Security Assessment and Risk Management
Read PDFSummary: This paper presents a compelling proposal for a Global Cyber Constitution, advocating for universal cybersecurity regulations, ethical governance, and a robust framework to safeguard digital infrastructure. It highlights the escalating threats in cyberspace and underscores the importance of international collaboration to address these challenges.
Key Topics:
Relevant Course: ENG 102 - Rhetoric II
Read PDFSummary: This paper analyzes Utilitarianism, applying it to a complex moral dilemma. It explores ethical decision-making using Jeremy Bentham and John Stuart Mill’s principles, particularly in scenarios involving life-or-death choices.
Key Themes:
Relevant Course: PHIL 103 - Introduction to Ethics
Read PDFSummary: This essay delves into the ethical dimensions of dietary choices, challenging cultural norms and moral inconsistencies. It invites readers to reconsider the moral weight of "Thou shalt not kill" by exploring its implications for animal ethics and our broader sense of responsibility.
Read EssaySummary: Explores logical fallacies, their historical roots in Aristotle's work, and their modern applications in politics, media, and advertising. The paper critiques flawed reasoning and highlights how logic can counteract misinformation.
Relevant Course: PHIL 104 - Introduction to Logic
Read PDFSummary: A deep dive into deductive vs. inductive arguments, explaining their strengths and limitations. It discusses validity, soundness, and probability-based reasoning, with examples of syllogisms and probabilistic logic.
Relevant Course: PHIL 104 - Introduction to Logic
Read PDFSummary: Analyzes validity vs. soundness in arguments using real-world debates and decision-making examples. It explains how logical reasoning helps construct persuasive, well-supported claims while avoiding fallacies.
Relevant Course: PHIL 104 - Introduction to Logic
Read PDFSummary: This essay explores what defines a cybersecurity expert, arguing that true expertise requires technical skills, ethical awareness, interdisciplinary knowledge, and existential courage. It draws parallels between cybersecurity ethics and philosophy.
Relevant Course: ENG 102 - Rhetoric II
Read PDFSummary: Critiques Tom Nichols' claim that the internet erodes respect for expertise. The essay highlights the internet’s role in democratizing knowledge, fostering collaboration, and promoting participatory learning.
Key Themes:
Relevant Course: ENG 102 - Rhetoric II
Read PDFSummary: Personal reflection on curiosity, gravity, and the human drive to seek understanding.
Read PDFSummary: Windows user account security system implementing password policies, NTFS permissions, firewall settings, and secure network configurations. Includes BitLocker encryption, secure web browsing, and password management.
Summary: Focuses on Windows Server administration, including setting up Active Directory, DHCP, DNS, and Group Policy Objects (GPOs). Involves creating organizational units (OUs), configuring domain controllers, and implementing password policies.
Read PDFSummary: A practical hacking challenge involving network enumeration, vulnerability identification, and flag retrieval using Kali Linux tools like Nmap, Wireshark, and Metasploit.
Key Topics:
Summary: Involves analyzing Apache web server logs and PCAP files using Wireshark to detect anomalies, identify suspicious IP addresses, and pinpoint potential attackers.
Key Topics:
Relevant Course: CIS 294 - Cybersecurity Analyst
Read PDFSummary: A digital forensics investigation analyzing a suspected hacker's laptop via disk imaging, metadata extraction, and evidence collection to track malicious activity.
Key Topics:
Relevant Course: CIS 296 - Computer Forensics
Read PDF