{"id":451,"date":"2025-12-05T18:46:19","date_gmt":"2025-12-05T18:46:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aberr019\/?page_id=451"},"modified":"2025-12-05T21:52:19","modified_gmt":"2025-12-05T21:52:19","slug":"network-security","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aberr019\/network-security\/","title":{"rendered":"Security Architecture &amp; Cloud Solutions Design"},"content":{"rendered":"\n<p><strong>Overview<\/strong><\/p>\n\n\n\n<p>             Through my work at Valor Cybersecurity, I helped begin designing a secure system architecture that balances usability, scalability, and operational security for an Azure-based environment. The Azure Stack architecture outline demonstrates early-stage architectural thinking through mapping user workflows, data handling, access requirements, and cloud resource considerations for a small business client-facing portal. I continued to expand upon my architectural approach at Valor by carrying out infrastructure analyses on InfoSec Resource Plans to align the business security resources with updated NIST Rev. 3 security controls, technology capabilities, and implementation recommendations. Lastly, my Linux user &amp; group management lab strengthened my understanding of least privilege, access control, and secure user management at the system level. Together, these artifacts highlight my skill set in secure design, cloud planning, and practical implementation of core architectural principles.<\/p>\n\n\n\n<p>Artifact 1 &#8211; Azure Stack Architecture Outline <\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-1157cb86-ac33-4c12-8f8c-f12e1ffb9e41\" href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/Rough-Azure-Stack-Outline.docx\">Rough-Azure-Stack-Outline<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/Rough-Azure-Stack-Outline.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1157cb86-ac33-4c12-8f8c-f12e1ffb9e41\">Download<\/a><\/div>\n\n\n\n<p>Artifact 2 &#8211; InfoSec Resource Analysis &amp; Resource Recommendation <strong>(CONFIDENTIAL)<\/strong><\/p>\n\n\n\n<p>Artifact 3 &#8211; Linux User &amp; Group Management Lab<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-f1ba1889-0c6b-4e43-b4aa-6215f38ceafb\" href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/Assignment-4.docx\">Linux User Management Lab<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/Assignment-4.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f1ba1889-0c6b-4e43-b4aa-6215f38ceafb\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview Through my work at Valor Cybersecurity, I helped begin designing a secure system architecture that balances usability, scalability, and operational security for an Azure-based environment. The Azure Stack architecture outline demonstrates early-stage architectural thinking through mapping user workflows, data handling, access requirements, and cloud resource considerations for a small business client-facing portal. I continued&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/network-security\/\">Read More<\/a><\/div>\n","protected":false},"author":29079,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/451"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/users\/29079"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/comments?post=451"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/451\/revisions"}],"predecessor-version":[{"id":482,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/451\/revisions\/482"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/media?parent=451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}