Below are some areas of research I am interested in during my time studying cybersecurity, follow this page for constant updates. As time goes on, more complex ideas will be covered.
Launching into Cybersecurity: Cybersecurity and its Reach
What is it? Why is it such major issue for organisations? And finally, what role do Cyber Security professionals play in organisations?
Launching into Cybersecurity: Cybersecurity, a Global Issue
Starting off the module, we were asked "Discuss why Cyber Security is now a global issue and why it is important for companies to invest in Cyber Security". For the first 2 weeks we, as classmates, discussed this with each other. Click below to find out what I learned over the first 3 weeks!
Launching into Cybersecurity: Threat Modelling and Secure Software Development
Click here to read my findings and thoughts from the reading material, lecturecasts, and personal research.
Launching into Cybersecurity: Discussion Post
This collaborative discussion asked us to "Identify and discuss two security technologies and the context in which they can be employed."
Launching into Cybersecurity: Discussion Summary Response
This collaborative discussion asked us to "Identify and discuss two security technologies and the context in which they can be employed". Read this post for my follow up response based on 2 weeks of reflection and responses from classmates.
Launching into Cybersecurity: Medical ASMIS Security Case Study
A case study example regarding an medical surgery enquiring about an appointment and scheduling management information system (ASMIS). As a cyber professional I was to cover the potential security flaws around it, and cyber security prevention methods. The analysis includes UML and class diagrams for the program.
Network Security: The Beginning
This is a short research piece I have written based on network security.
Network Security: IoT Security
This is a short research piece I have written based on IoT security.
Network Security: Alexa, Security Flawed?
This is a short research piece I have written based on the security flaws shown by Alexa.