{"id":99,"date":"2023-01-23T19:29:31","date_gmt":"2023-01-23T19:29:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=99"},"modified":"2026-05-04T00:05:13","modified_gmt":"2026-05-04T00:05:13","slug":"capstone","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/destinyh\/capstone\/","title":{"rendered":"Biocybersecurity (CYSE 495)"},"content":{"rendered":"\n<p>This course demonstrates my research skills through<strong> <\/strong>comprehensive risk assessments and analytical papers focused on securing biological data.<\/p>\n\n\n\n<ol><\/ol>\n\n\n\n<p><strong>#1: AbbVie Cybersecurity Assessment<\/strong><\/p>\n\n\n\n<p>In this cybersecurity assessment, I worked with other students to evaluate, identify, and mitigate the risks for the pharmaceutical company AbbVie, utilizing the NIST Framework. This assessment strengthened my understanding of how cyber professionals conduct risk assessments through research to help companies like AbbVie defend their digital infrastructure. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/AbbVie-Cybersecurity-Assessment-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of AbbVie Cybersecurity Assessment .\"><\/object><a id=\"wp-block-file--media-867874eb-df7c-4ded-8f5a-c450b451065f\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/AbbVie-Cybersecurity-Assessment-2.pdf\">AbbVie Cybersecurity Assessment <\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/AbbVie-Cybersecurity-Assessment-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-867874eb-df7c-4ded-8f5a-c450b451065f\">Download<\/a><\/div>\n\n\n\n<p><strong>#2: Medijacking<\/strong><br><br>In this research paper, I analyzed one of the case studies from TrapX Research Labs to investigate medijacking, the exploitation of outdated medical networks to compromise life-critical devices. This paper taught me the difference between the nature of exposure and compromise. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Write-Up_-Medijacking-Case-3-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write Up #1: Medijacking.\"><\/object><a id=\"wp-block-file--media-c3859736-50e0-4992-9992-4b297c913822\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Write-Up_-Medijacking-Case-3-.pdf\">Write Up #1: Medijacking<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Write-Up_-Medijacking-Case-3-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c3859736-50e0-4992-9992-4b297c913822\">Download<\/a><\/div>\n\n\n\n<p><strong>#3: Hacking Humans<\/strong><\/p>\n\n\n\n<p>In this research paper, I analyzed the possible risks of genetic data, such as discrimination, biometric malware, identity theft, and more. This paper deepened my understanding of non-traditional cyberattacks.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Hacking-Humans-Write-Up-2-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write Up #2: Hacking Humans.\"><\/object><a id=\"wp-block-file--media-9a293b3f-dcd3-48b8-9d5d-33456e3fe012\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Hacking-Humans-Write-Up-2-2.pdf\">Write Up #2: Hacking Humans<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Hacking-Humans-Write-Up-2-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9a293b3f-dcd3-48b8-9d5d-33456e3fe012\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course demonstrates my research skills through comprehensive risk assessments and analytical papers focused on securing biological data. #1: AbbVie Cybersecurity Assessment In this cybersecurity assessment, I worked with other students to evaluate, identify, and mitigate the risks for the pharmaceutical company AbbVie, utilizing the NIST Framework. This assessment strengthened my understanding of how cyber &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/capstone\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Biocybersecurity (CYSE 495)<\/span><\/a><\/p>\n","protected":false},"author":26014,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/99"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/users\/26014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/comments?post=99"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/99\/revisions"}],"predecessor-version":[{"id":488,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/99\/revisions\/488"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/media?parent=99"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}