Skip to content

Locky

Carl Lochstampfor Jr

  • Home
    • About Me
    • Certifications
    • Resume
      • Skills & Experience
      • Awards & Recognitions
    • Goals & Future Plans
    • IDS 493: Capstone Project
  • Cybersecurity Foundations
    • CYSE 250: Basic Cybersecurity Programming
    • CYSE 300: Intro to Cybersecurity
    • CYSE 301: Cybersecurity Techniques and Operations
    • IT 315: Intro to Networking & Security
    • CYSE 462: Cybersecurity Fundamentals
    • MATH
  • Tech & Society
    • CYSE 200T: Cybersecurity, Technology, & Society
    • CYSE 201S: Cybersecurity & Social Science
    • IDS 300W: Interdisciplinary Theory & Concepts
    • CYSE 418: Enterprise Information Assurance
  • Law & Ethics
    • CYSE 406: Cyber Law
    • CYSE 425: Cyber Strategy & Policy
  • Internship
    • CYSE 368: Cybersecurity Internship
    • CYSE 494: Entrepreneurship in Cybersecurity
  • Cybersecurity Applications
    • CYSE 270: Linux for Cybersecurity
    • CYSE 280: Windows System Management & Security
    • CYSE 420: Applied ML in Cybersecurity
    • CYSE 450: Ethical Hacking & Penetration Testing
    • CS 464: Network Systems Security
  • Blog
  • News
  • Wikis
  • Contact

Category: Security

The Threat of Deepfakes: An Overview of Human Ability to Detect Them

The biggest threat of deepfakes isn’t the AI—it’s your brain. I detail the psychological reasons (like the “seeing-is-believing” bias) why humans fail to detect these fakes. Don’t be fooled. Read the full research!

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Ethernet Network Design Project

Designed a complete Ethernet network for a four-floor school with 148 Cat6 drops, a fiber backbone, VLAN segmentation, Wi-Fi 6 access points, PoE switches, and pfSense security.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Reducing Human Errors That Influence Data Breaches

95% of data breaches involve human error. My paper details the cognitive and organizational factors that lead to these errors and outlines technical and non-technical strategies to build a Human Firewall. Full ODU analysis here!

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The Role and Necessity of the NIST Cybersecurity Framework

The NIST CSF is the gold standard for risk management. My paper breaks down the core Identify, Protect, Detect, Respond, Recover functions and explains how to integrate this framework into any organizational culture. Download the full ODU guide!

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

System Administrator Roles & Responsibilities

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Artificial Intelligence in Digital Forensics: Opportunities, Risks, and Future Directions

Analysis of how artificial intelligence enhances digital forensics, including automation, threat detection, associated risks, and future trends in AI-driven investigations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Determinism within Cybersecurity & Computer Hacking

An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The NIST Cybersecurity Framework & the Importance of Proper Documentation

Overview of the NIST Cybersecurity Framework and why proper documentation is essential for risk management, compliance, incident response, and organizational security.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

IPv6 Security: Enhancements, New Challenges, and Adoption Barriers

Explores IPv6 security enhancements, emerging challenges, and key adoption barriers, including built-in protections, deployment issues, and organizational considerations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The Role of Baselines in Network Monitoring

Explains how baselines support effective network monitoring by establishing normal performance patterns, improving anomaly detection, security, and operational visibility

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Managing Cybersecurity Change: Using Tactical Empathy to Overcome Resistance

Examines how tactical empathy improves cybersecurity change management by reducing resistance, strengthening communication, and supporting successful adoption of new security practices.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Malicious Code and Activity – Mitigation Methods

Overview of malicious code threats and mitigation methods, including detection, containment, system hardening, user awareness, and modern cybersecurity defenses.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Ransomware Mitigation Strategies for Windows Systems: Securing Servers and Endpoints

Explores ransomware mitigation strategies for Windows systems, including backups, hardening, access controls, monitoring, and endpoint protection for servers and endpoints.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Ensuring Accessibility when Implementing the CIA Triad

Examines how to preserve accessibility while implementing the CIA Triad, ensuring systems remain usable, resilient, and secure without disrupting organizational operations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Human Factors Cybersecurity Engineering: Inclusive Design through Social Science

Explores how human factors and social science inform cybersecurity engineering, focusing on inclusive design, usability, error reduction, and stronger security outcomes.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Phishing Campaigns: Protection Against Credential Theft

Explores how phishing campaigns target users for credential theft and outlines key protections including MFA, awareness training, email filtering, and zero-trust security.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

IPv6 Cybersecurity Enhancements

Explores IPv6 cybersecurity enhancements, including improved routing security, built-in protections, simplified architectures, and reduced vulnerabilities compared to IPv4.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cybersecurity Incidents & Law Enforcement

Examines how law enforcement responds to cybersecurity incidents, including evidence collection, jurisdiction challenges, investigative processes, and interagency collaboration.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cyber Threats vs. Cyber Attacks

Explains the difference between cyber threats and cyber attacks, how each affects risk, defense strategies, and organizational security planning.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Internet of Things (IoT): Security Challenges

Explores key IoT security challenges, including weak authentication, poor patching, privacy risks, large attack surfaces, and vulnerabilities in connected devices.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Computer Security vs. Information Security

Explains the difference between computer security and information security, including their goals, scope, protective controls, and roles in organizational risk management.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Protecting Availability of Your Systems: A CISO’s Perspective

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Human Factors Cybersecurity Engineering: Inclusive Design through Social Science

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Linux Exercise – File Permission

Explains Linux file permission concepts, including read, write, execute rights, ownership, and how proper permission management enhances system security.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: Jeremy from Marketing

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: Human Hacker

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Windows Server ed. History

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Ensuring Accessibility when Implementing the CIA Triad

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cyber Technology in Workplace Deviance

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Exploring Attacks on Availability: Rootkits

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Human Factors: A CISO’s Response to Human Error & Threats

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Search and Seizure Warrant ** MOCK **

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The “Human Firewall”

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cybercrime: Using Psychological Theories to Understand & Prevent It

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

BioCybersecurity: Ethical Considerations of CRISPR Gene Editing

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Hacking Humans

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The Threat of Deepfakes: An Overview of Human Ability to Detect Them

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Victim Precipitation in Cyber Victimization & Potential Remedies

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Creating Cybersecurity Policies: Data Loss Prevention (DLP)

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
%d
    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept