Darknet Diaries: NotPetya Attack

This article analyzes the NotPetya cyberattack as discussed in Darknet Diaries Episode 54. It examines the tools used—Mimikatz, EternalBlue, and worm-based ransomware—the strategic targeting of Ukraine, and the unintended global spread that disrupted multinational companies and critical infrastructure worldwide.

Designing the Public Sphere with Intelligification

This essay analyzes Peter-Paul Verbeek’s concept of intelligification and its impact on governance in a hyperconnected society. It explores how markets, businesses, communities, and individuals should adapt regulation and ethical design practices as state authority diminishes and smart technologies increasingly mediate public life.

Password Cracking (System Users)

This lab explores password cracking techniques across Linux and Windows systems. Using tools like John the Ripper and Cain & Abel, the assignment demonstrates dictionary and brute-force attacks on user password hashes. It highlights how weak passwords can be compromised and emphasizes the importance of strong authentication practices, secure password policies, and system hardening to defend against credential-based attacks.

Cyber Technology in Workplace Deviance

This article examines how cyber technology creates opportunities for workplace deviance, including insider threats, data exfiltration, cyberloafing, harassment, and digital sabotage. It explores how organizations mitigate these risks through Data Loss Prevention (DLP), access controls, Acceptable Use Policies, and collaboration between CISOs and Human Resources to detect and prevent insider misconduct.

Penetration Testing in Windows: Exploiting SMB Vulnerabilities

This lab demonstrates penetration testing techniques against Windows systems using Kali Linux and the Metasploit framework. The exercise includes scanning with Nmap, exploiting the MS08-067 SMB vulnerability on Windows XP, testing EternalBlue against Windows Server 2022, and generating a Meterpreter payload for Windows 7. The assignment highlights how legacy vulnerabilities, misconfigurations, and outdated systems can expose networks to remote exploitation.

Stuxnet: When a Worm Became a Weapon

This essay examines Stuxnet, one of the most sophisticated cyberweapons ever developed. The malware targeted Siemens SCADA systems controlling uranium enrichment centrifuges at Iran’s Natanz facility. By exploiting multiple zero-day vulnerabilities, using stolen certificates, and spreading through infected USB drives, Stuxnet demonstrated how cyberattacks can cause real-world physical damage to critical infrastructure.

ICS & SCADA: Securing Critical Infrastructure

This article explains Industrial Control Systems (ICS) and SCADA systems, outlining their components, workflow, and importance in managing critical infrastructure such as power grids and water systems. It examines common vulnerabilities—including legacy systems and weak network segmentation—and discusses how SCADA supports monitoring, defense-in-depth, and cybersecurity resilience.

Quantum Encryption & the Limits of Foolproof Security

This discussion explores quantum key distribution (QKD) and the idea of “foolproof” encryption. While quantum encryption may strengthen cryptographic defenses, major breaches like Equifax and Target demonstrate that operational failures—such as poor patch management and third-party risk—often cause data compromise. True cybersecurity requires both strong encryption and disciplined organizational practices.

Exploring Attacks on Availability: Rootkits

This article examines rootkits as a powerful form of attack on availability, explaining how they operate at the kernel level to evade detection and disrupt system functionality. It explores real-world examples, financial and operational impacts on organizations, and defensive strategies such as secure boot, endpoint monitoring, and external scanning for remediation.

Sword vs. Shield: Network Scanning and Firewall Security

This lab assignment covers network scanning techniques using Nmap and firewall configuration with pfSense. It explores the vulnerabilities discovered through the scanning process, such as open ports and potential exploitation, and demonstrates how configuring firewall rules can mitigate these risks. The exercise also evaluates the advantages and disadvantages of blocking ICMP traffic for network defense and operational efficiency.

The Critical Need for Cybersecurity in Today’s Economy

This essay examines the role of cybersecurity in today’s economy, highlighting its importance in protecting supply chains, critical infrastructure, and business continuity. It explores the readiness economy, workforce opportunities in cybersecurity, and the growing need for resilience against nation-state attacks and sophisticated cyber threats.

Traffic Tracing & Network Packet Analysis

This assignment explores traffic tracing and network packet analysis using Wireshark in a virtualized lab environment. It examines ICMP, DNS, and FTP traffic to understand packet flow, filtering techniques, response behavior, and the security risks of plaintext protocols through hands-on analysis.

Victim Precipitation in Cyber Victimization & Potential Remedies

How much does user behavior contribute to cyber losses? My paper analyzes Victim Precipitation in cyberattacks and provides proven, actionable remedies—from effective training to policy changes—to minimize your human risk factor. Full ODU analysis here!

How Linear Algebra and Probability Distributions Concepts Are Utilized in Various ML Models

This essay explains how linear algebra and probability distributions form the mathematical foundation of machine learning models. It explores how vectors, matrices, tensors, and probabilistic reasoning enable learning, prediction, and uncertainty handling in modern ML systems.

Components of a Business: What They Are & Their Relation to IT & Cybersecurity

Every component of a business—from R&D to Sales—is now digitized. This paper details how IT and cybersecurity must move from support roles to strategic partners to drive competitive advantage and control organizational risk. Download the full report!

Standing Desk Time Tracker

I built a simple Excel Standing Desk Time Tracker to create a quick, one-stop way to log standing sessions and clearly track week-to-week progress. ✅ Track up to 8 sessions/day (start/end time)✅ Auto-calculates durations + daily totals✅ Weekly summary (total hours + daily average)✅ Year-long “Master Tracking” sheet for quarterly + annual progress Excel keeps…

First Amendment Freedoms & Protections: The Cyber World and You

This paper analyzes First Amendment freedoms in the digital world, examining the roles of government institutions and private platforms in moderating misleading or harmful content. It explores legal limits on speech, platform responsibility, protest rights, and the impact of technology on democratic discourse and cybersecurity law.

Building Amazon’s Next-Generation Fulfillment Network

How did Amazon cut shipping costs & boost delivery speed? I break down the Project FC Network Initiative—the massive regionalization effort powered by network optimization, Edge Computing, and AWS cloud. See the business case for next-gen fulfillment. Read the full paper!

The CIA Triad & the AAA Framework

Dive into the essential backbone of cybersecurity. This paper breaks down the CIA Triad (Confidentiality, Integrity, Availability) and pairs it with the operational power of the AAA Framework (Authentication, Authorization, Accounting). Learn how these twin concepts form the non-negotiable foundation for securing any modern digital asset.