Analytical Skills

Throughout my coursework at Old Dominion University, I have developed strong analytical and critical thinking skills, which have been essential for success in my cybersecurity studies. Many of my classes required me to evaluate complex scenarios, analyze data, and assess potential risks—skills crucial in the ever-evolving field of cybersecurity. The papers featured on this page demonstrate my ability to apply analytical reasoning to a variety of topics, from assessing network vulnerabilities to developing security strategies. Each project challenged me to think critically and consider multiple perspectives, allowing me to grow as a thoughtful and resourceful problem-solver.

CYSE 355: Cyber Ethics- User Data Case Analysis

This paper, completed as part of my Cyber Ethics course, explores the ethical and privacy implications of data collection practices. In this course, we researched various controversial issues and developed informed stances on them. Here, I advocate for the United States to adopt a data protection framework similar to the European Union’s General Data Protection Regulation (GDPR). Through cases like Facebook’s 2008 study on college students, the analysis highlights issues of data transparency, consent, and user privacy breaches. Arguing from a utilitarian perspective, it makes the case that adopting GDPR-like standards in the U.S. would prioritize user privacy, enforce accountability, and foster public trust. This paper demonstrates critical thinking by balancing the benefits of data collection with the need to protect individual rights and security.

Case-Analysis-2.4-CYSE-355

CYSE 355: Cyber Ethics- Cyber Warfare Case Analysis

This paper provides a critical examination of cyber warfare between Israel and Iran, focusing on the ethical implications of attacks on public infrastructure through the lens of deontological ethics and information ethics. In analyzing the moral challenges of cyber warfare, I applied critical thinking to assess whether such acts can be justified given their indiscriminate impact on civilians and infrastructure. By exploring both deontological principles—emphasizing fairness and respect for individuals—and information ethics, which considers the collective impact on the “infosphere,” this paper argues that cyber warfare, as conducted in this case, fails to uphold just war principles. Through this analysis, I highlight the broader consequences of cyber attacks, emphasizing the need for ethical considerations in modern warfare.

Case-Analysis-6-Cyber-Warfare

CYSE 425: Cyber Law- BYOD Policy Analysis

This paper, part of my cyber law class where we examine various cyber-related regulations and their implications, introduces the concept of Bring Your Own Device (BYOD), which allows employees to use personal devices for work. BYOD offers benefits like reduced operational costs and increased productivity, yet it also brings complex legal and political concerns. A primary issue is the conflict with the 4th Amendment, as BYOD blurs the line between personal privacy and corporate interests, especially in forensic investigations. Effective policies must include clear consent clauses for device searches and strict data ownership protocols to avoid legal challenges. Crafting these policies requires critical thinking to balance productivity with privacy rights, carefully analyzing device ownership, data retention, and privacy protection in a corporate setting.

Policy-Analysis-Paper-2-BYOD-

IDS 493: Cybersecurity Internship- Reflective Essay

This reflective essay was written as part of my ePortfolio class, a requirement for cybersecurity students at Old Dominion University to showcase and reflect on their academic and professional development. Through this essay, I analyze the critical skills I developed during my coursework, such as problem-solving, communication, and critical thinking, all of which have shaped my approach to cybersecurity. By reflecting on various projects and interdisciplinary studies, I delve into how each experience contributed to my growth, particularly in tackling complex cybersecurity challenges and applying ethical considerations. This process of self-assessment and reflection has deepened my understanding of how my education at ODU has prepared me for a dynamic and evolving career in cybersecurity.

Reflective-Essay