Milestone Projects

This page highlights my most significant academic projects completed throughout my Cybersecurity degree at Old Dominion University (ODU). Each project reflects hands-on application of core security principles โ€” spanning programming, network infrastructure, Linux administration, and research analysis. Use the links and resources below to explore source code, full technical reports, and supporting documentation.


๐Ÿ”ฌ COVA CCI Undergraduate Cybersecurity Research (Coastal Virginia Center for Cyber Innovation โ€” Commonwealth Cyber Initiative, ODU Node)

Role: Researcher | Mentor-Guided Independent Study | Spring 2026

Competitively selected to participate in the COVA CCI Cybersecurity Undergraduate Research Program โ€” an independent study where students complete original, mentor-guided research on a cybersecurity topic of their choosing. The program is funded through the Commonwealth of Virginia and concludes with a formal Research Showcase presentation.

๐Ÿ“ŒPublication Status: This research has been submitted for external, third-party peer review independent of Old Dominion University. It is currently under double-blind review, meaning neither the author nor the reviewers are disclosed to one another during the evaluation process. Full details โ€” including the title, abstract, and findings โ€” will be made publicly available upon acceptance and release.

โณ Anticipated Release: July 31, 2026 (subject to review timeline)

๐Ÿ”— Learn more about the COVA CCI Undergraduate Research Program


๐Ÿงช Secure File Sharing System (CYSE 250)

Technologies: Python, Socket Programming, CLI, Encryption (Caesar Cipher)

Developed a secure file sharing system using Python, implementing core cybersecurity principles through a TCP-based client-server architecture. The system integrates encryption, authentication, and file isolation to ensure secure data handling and controlled user access.

๐Ÿ” Project Highlights

  • Built a TCP client-server architecture using Python socket programming
  • Implemented user authentication system with persistent credential handling
  • Applied encryption/decryption (Caesar cipher) for secure data transmission
  • Designed isolated file storage per user to enforce access control
  • Developed command-line interface (CLI) for user interaction and system navigation
  • Managed file operations including upload, retrieval, and storage securely

๐Ÿ” Security Concepts Applied

  • Secure client-server communication
  • Basic encryption and data protection
  • Authentication and access control
  • File system security and isolation
  • Input handling and system interaction

๐Ÿง  What This Project Demonstrates

This project demonstrates the ability to translate cybersecurity concepts into a working system, combining networking, programming, and security principles into a functional application.

๐Ÿ–ผ๏ธ System Demonstration

Click Image or Button to view source code and implementation details on GitHub.


๐ŸŒEthernet Network Design Project (IT 315)

Designed a complete Ethernet network infrastructure for a four-level building, including structured cabling, switching architecture, and security implementation. This project simulated a real-world network deployment scenario, requiring both technical design decisions and cost-performance tradeoff analysis.

๐Ÿ” Project Highlights

  • Designed a hierarchical star topology with centralized equipment room and distributed telecommunications closets
  • Planned and calculated 148 network drops across a multi-floor environment
  • Implemented Cat6 structured cabling with distance constraints aligned to industry standards
  • Designed a fiber backbone (OM3 multimode) for scalability and high-speed interconnects
  • Selected and integrated managed PoE switches for network segmentation and device support
  • Configured a pfSense firewall (Netgate 6100) for network security, VLAN segmentation, and potential IDS/IPS
  • Integrated Wi-Fi 6 access points for modern wireless coverage
  • Developed a cost-optimized bill of materials (~$13,591) balancing performance and budget

๐Ÿง  Applied Networking & Security Concepts

  • Network topology design and hierarchical infrastructure
  • Structured cabling standards (Cat6, ANSI/TIA-568 alignment)
  • VLAN segmentation and network isolation
  • Firewall-based security architecture
  • Scalability planning using fiber backbone
  • Real-world budgeting and hardware selection

๐Ÿง  What This Project Demonstrates

This project demonstrates the ability to design and justify a complete enterprise network from the ground up โ€” translating real-world physical and budget constraints into a scalable, secure, and professionally documented infrastructure solution. It reflects applied knowledge of networking standards, security architecture, and hardware selection in a simulated deployment environment.

Ethernet_Network_Design_Project_FD

๐Ÿ‘‰ Download Project Report (PDF)


๐Ÿ›ก๏ธ Ransomware Mitigation Strategies for Windows Systems (CYSE 280)

Technologies & Frameworks: Windows Server 2016/2019/2022, Windows Defender, WSUS, AppLocker, GPOs, NIST CSF, 3-2-1 Backup Strategy

This research paper examines ransomware mitigation strategies for Windows servers and endpoints, using the BlackByte (2024) and WannaCry (2017) attacks as case studies. It analyzes the ransomware lifecycle, evaluates technical countermeasures, and provides actionable recommendations grounded in NIST’s Cybersecurity Framework and industry best practices.

๐Ÿ” Project Highlights

  • Analyzed two real-world ransomware case studies โ€” WannaCry (2017) and BlackByte (2024) โ€” identifying attack vectors, tools, and outcomes
  • Applied the NIST CSF five-function model (Identify, Protect, Detect, Respond, Recover) to structure a comprehensive mitigation framework
  • Evaluated Windows-native security tools including Defender, AppLocker, WSUS, GPOs, and Event Logs
  • Developed a comparison table of tools, functionality, mitigation impact, and implementation complexity
  • Proposed 12 actionable recommendations covering backups, EDR solutions, network segmentation, authentication, and employee training
  • Created custom flowcharts illustrating ransomware detection, response, and recovery phases

๐Ÿ” Security Concepts Applied

  • Ransomware lifecycle analysis (infection, propagation, execution, impact, recovery)
  • Crypto vs. Locker ransomware differentiation
  • EternalBlue SMB exploit and MS17-010 patch management
  • 3-2-1 backup strategy and immutable/air-gapped storage
  • Endpoint Detection and Response (EDR) implementation
  • Phishing simulation and human factors integration
  • RaaS (Ransomware-as-a-Service) threat modeling

๐Ÿง  What This Paper Demonstrates

This paper demonstrates the ability to conduct applied cybersecurity research at a professional level โ€” analyzing real-world attack scenarios, evaluating technical defense frameworks, and translating NIST standards into practical, organization-ready recommendations for Windows environments.

CYSE-280-Final-Research-Paper-FD-submission


Shell Scripting, Redirection, & Directory Checking (CYSE 270)

๐Ÿง Completed as part of CYSE 270: Linux for Cybersecurity, this lab demonstrates practical bash shell scripting in a Linux environment. Tasks included writing conditional logic scripts (if/else), automating file creation and existence checking, validating directory structures, and applying redirection operators โ€” all fundamental skills for Linux-based cybersecurity administration and automation.

Lab-8-Shell-Scripting-fd


Ensuring Accessibility when Implementing the CIA Triad (CYSE 200T)

๐Ÿ“‹ This analytical paper argues that cybersecurity policies must proactively address accessibility gaps when implementing the CIA Triad โ€” Confidentiality, Integrity, and Availability. Drawing on social science research and Human Factors Cybersecurity Engineering (HFCE) principles, it proposes policy frameworks using assistive technologies and human-centered design (HCD) to reduce the digital divide for older adults and people with disabilities in an increasingly digital-first society.

๐Ÿ“Œ Key Arguments & Topics Covered

  • Accessibility gaps in CIA Triad implementation for older adults and people with disabilities
  • Human Factors Cybersecurity Engineering (HFCE) and human-centered design (HCD) as policy solutions
  • Role of assistive technologies (biometric MFA, text-to-speech, screen readers) in closing the digital divide
  • Policy recommendations aligned with WCAG 2.1, the EU Web Accessibility Directive, and Canada’s Accessible Canada Act
  • Societal and economic benefits of inclusive cybersecurity infrastructure

๐Ÿง  What This Paper Demonstrates

This paper demonstrates the ability to analyze the societal impact of technical cybersecurity systems through an interdisciplinary lens โ€” connecting policy, social science, and security engineering to argue for more equitable and human-centered design standards.


Human Factors Cybersecurity Engineering: Inclusive Design through Social Science (CYSE 201S)

๐Ÿค This research paper examines the Human Factors Cybersecurity Engineering (HFCE) career field and its deep reliance on social science to build secure, inclusive digital systems. It explores how core concepts โ€” self-efficacy, risk perception, human-computer interaction (HCI), and human-centered design (HCD) โ€” guide practitioners in designing accessible technologies that empower older adults and people with disabilities to engage confidently and safely in today’s digital world.

๐Ÿ“Œ Key Arguments & Topics Covered

  • How Human Factors Cybersecurity Engineers (HFCEs) apply social science principles in daily practice
  • Self-efficacy, risk perception, HCI, and HCD as frameworks for inclusive security design
  • Assistive technologies (screen readers, voice recognition, wearables) and their role in bridging the digital divide
  • Impact of HFCE work on marginalized groups including older adults and people with disabilities
  • SETA program design and gamification as tools for reducing human error in cybersecurity

๐Ÿง  What This Paper Demonstrates

This paper demonstrates the ability to connect cybersecurity career practice with social science research โ€” examining how human factors engineering addresses real-world accessibility and equity challenges across diverse user populations.