The biggest threat of deepfakes isn’t the AI—it’s your brain. I detail the psychological reasons (like the “seeing-is-believing” bias) why humans fail to detect these fakes. Don’t be fooled. Read the full research!
Category: Security
Ethernet Network Design Project
Designed a complete Ethernet network for a four-floor school with 148 Cat6 drops, a fiber backbone, VLAN segmentation, Wi-Fi 6 access points, PoE switches, and pfSense security.
Reducing Human Errors That Influence Data Breaches
95% of data breaches involve human error. My paper details the cognitive and organizational factors that lead to these errors and outlines technical and non-technical strategies to build a Human Firewall. Full ODU analysis here!
The Role and Necessity of the NIST Cybersecurity Framework
The NIST CSF is the gold standard for risk management. My paper breaks down the core Identify, Protect, Detect, Respond, Recover functions and explains how to integrate this framework into any organizational culture. Download the full ODU guide!
Artificial Intelligence in Digital Forensics: Opportunities, Risks, and Future Directions
Analysis of how artificial intelligence enhances digital forensics, including automation, threat detection, associated risks, and future trends in AI-driven investigations.
Determinism within Cybersecurity & Computer Hacking
An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.
The NIST Cybersecurity Framework & the Importance of Proper Documentation
Overview of the NIST Cybersecurity Framework and why proper documentation is essential for risk management, compliance, incident response, and organizational security.
IPv6 Security: Enhancements, New Challenges, and Adoption Barriers
Explores IPv6 security enhancements, emerging challenges, and key adoption barriers, including built-in protections, deployment issues, and organizational considerations.
The Role of Baselines in Network Monitoring
Explains how baselines support effective network monitoring by establishing normal performance patterns, improving anomaly detection, security, and operational visibility
Managing Cybersecurity Change: Using Tactical Empathy to Overcome Resistance
Examines how tactical empathy improves cybersecurity change management by reducing resistance, strengthening communication, and supporting successful adoption of new security practices.
Malicious Code and Activity – Mitigation Methods
Overview of malicious code threats and mitigation methods, including detection, containment, system hardening, user awareness, and modern cybersecurity defenses.
Ransomware Mitigation Strategies for Windows Systems: Securing Servers and Endpoints
Explores ransomware mitigation strategies for Windows systems, including backups, hardening, access controls, monitoring, and endpoint protection for servers and endpoints.
Ensuring Accessibility when Implementing the CIA Triad
Examines how to preserve accessibility while implementing the CIA Triad, ensuring systems remain usable, resilient, and secure without disrupting organizational operations.
Human Factors Cybersecurity Engineering: Inclusive Design through Social Science
Explores how human factors and social science inform cybersecurity engineering, focusing on inclusive design, usability, error reduction, and stronger security outcomes.
Phishing Campaigns: Protection Against Credential Theft
Explores how phishing campaigns target users for credential theft and outlines key protections including MFA, awareness training, email filtering, and zero-trust security.
IPv6 Cybersecurity Enhancements
Explores IPv6 cybersecurity enhancements, including improved routing security, built-in protections, simplified architectures, and reduced vulnerabilities compared to IPv4.
Cybersecurity Incidents & Law Enforcement
Examines how law enforcement responds to cybersecurity incidents, including evidence collection, jurisdiction challenges, investigative processes, and interagency collaboration.
Cyber Threats vs. Cyber Attacks
Explains the difference between cyber threats and cyber attacks, how each affects risk, defense strategies, and organizational security planning.
Internet of Things (IoT): Security Challenges
Explores key IoT security challenges, including weak authentication, poor patching, privacy risks, large attack surfaces, and vulnerabilities in connected devices.
Computer Security vs. Information Security
Explains the difference between computer security and information security, including their goals, scope, protective controls, and roles in organizational risk management.
Linux Exercise – File Permission
Explains Linux file permission concepts, including read, write, execute rights, ownership, and how proper permission management enhances system security.