This project analyzes the Equifax data breach to understand its causes & develop prevention strategies. Key techniques include vulnerability assessment, threat intel. & incident response analysis.
This project involves conducting an internal security audit for Botium Toys, a small U.S. toy company experiencing growth in its online presence. Key activities include implementing the NIST Cybersecurity Framework (NIST CSF), defining the audit's scope and goals, cataloging IT assets, and performing a comprehensive risk assessment.
This project involves creating an incident report following a DDoS attack on a multimedia company that provides web design, graphic design, and social media marketing services.
This project involves managing file permissions for the research team at a large organization to ensure appropriate user authorization. Key activities include examining existing file permissions using Linux commands, determining if they align with the required access levels, and modifying permissions to grant or revoke access as necessary.
This project involves demonstrating proficiency in SQL by investigating potential security issues related to login attempts and employee machines within a large organization. Key tasks include examining data from the employees and log_in_attempts tables to identify and analyze patterns that may indicate security vulnerabilities.
This project involves conducting a vulnerability assessment for an e-commerce company to evaluate the security risks associated with its remote database server, which has been publicly accessible since its launch. Key activities include identifying risks, assessing their impact, and proposing security measures to enhance the overall security posture of the organization.