{"id":2223,"date":"2026-03-21T16:22:59","date_gmt":"2026-03-21T16:22:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?page_id=2223"},"modified":"2026-04-20T19:57:23","modified_gmt":"2026-04-20T19:57:23","slug":"milestone-projects","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/locky\/milestone-projects\/","title":{"rendered":"Milestone Projects"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"558\" data-attachment-id=\"2282\" data-permalink=\"https:\/\/sites.wp.odu.edu\/locky\/milestone_projects_headerimage2\/\" data-orig-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?fit=2560%2C1428&amp;ssl=1\" data-orig-size=\"2560,1428\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Milestone_Projects_HeaderImage2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?fit=300%2C167&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?fit=1000%2C558&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2.jpg?resize=1000%2C558\" alt=\"\" class=\"wp-image-2282\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?resize=1024%2C571&amp;ssl=1 1024w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?resize=300%2C167&amp;ssl=1 300w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?resize=768%2C428&amp;ssl=1 768w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?resize=1536%2C857&amp;ssl=1 1536w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?resize=2048%2C1142&amp;ssl=1 2048w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Milestone_Projects_HeaderImage2-scaled.jpg?resize=538%2C300&amp;ssl=1 538w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This page highlights my most significant academic projects completed throughout my Cybersecurity degree at Old Dominion University (ODU). Each project reflects hands-on application of core security principles \u2014 spanning programming, network infrastructure, Linux administration, and research analysis. Use the links and resources below to explore source code, full technical reports, and supporting documentation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>\ud83d\udd2c <\/strong><span style=\"text-decoration: underline\"><strong>COVA CCI Undergraduate Cybersecurity Research<\/strong> <\/span><em>(Coastal Virginia Center for Cyber Innovation \u2014 Commonwealth Cyber Initiative, ODU Node)<\/em><\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>Role: Researcher | Mentor-Guided Independent Study | Spring 202<\/em>6<\/p>\n\n\n\n<p>Competitively selected to participate in the COVA CCI Cybersecurity Undergraduate Research Program \u2014 an independent study where students complete original, mentor-guided research on a cybersecurity topic of their choosing. The program is funded through the Commonwealth of Virginia and concludes with a formal Research Showcase presentation.<\/p>\n\n\n\n<p>\ud83d\udccc <strong>Publication Status:<\/strong> This research has been archived as a preprint on arXiv and is currently under <strong>double-blind peer review<\/strong> at IEEE CNS 2026. The preprint is publicly available at <a href=\"https:\/\/arxiv.org\/abs\/2604.11752\">arxiv.org\/abs\/2604.11752<\/a>.  This is paper&#8217;s findings were presented at the COVA CCI Undergraduate Research Showcase (April 17, 2026).<\/p>\n\n\n\n<p>\u23f3 <strong>Anticipated Release:<\/strong> Full peer-reviewed publication and GitHub repository release is anticipated by July 31, 2026 (subject to review timeline).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" data-attachment-id=\"2448\" data-permalink=\"https:\/\/sites.wp.odu.edu\/locky\/milestone-projects\/cova_se_conversation_dataset-1\/\" data-orig-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?fit=1248%2C832&amp;ssl=1\" data-orig-size=\"1248,832\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"COVA_SE_Conversation_Dataset-1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?fit=300%2C200&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?fit=1000%2C667&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1-1024x683.jpg?resize=1000%2C667&#038;ssl=1\" alt=\"\" class=\"wp-image-2448\" style=\"width:678px;height:auto\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?resize=960%2C640&amp;ssl=1 960w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?resize=450%2C300&amp;ssl=1 450w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/04\/COVA_SE_Conversation_Dataset-1.jpg?w=1248&amp;ssl=1 1248w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>\ud83d\udd2c COVA Research Paper \u2014 arXiv Preprint Published<\/strong> <em>April 2026<\/em><\/p>\n\n\n\n<p><strong>Paper:<\/strong> <em>A Synthetic Conversational Smishing Dataset for Social Engineering Detection<\/em> Carl Lochstampfor &amp; Dr. Ayan Roy (Christopher Newport University) <a href=\"https:\/\/arxiv.org\/abs\/2604.11752\">arxiv.org\/abs\/2604.11752<\/a><\/p>\n\n\n\n<p>The dataset consists of 3,201 synthetic multi-turn scam conversations across 8 categories. Best detection model: XGBoost + TF-IDF at 72.5% accuracy \u2014 more than double the random baseline. A 10,000-conversation expansion is currently underway for a follow-on second paper.<\/p>\n\n\n\n<p>The long-term vision is an autonomous AI agent that can identify, engage, and neutralize scam calls in real time \u2014 whether the threat is a human caller running a script or an AI-driven bot doing it at scale. That agent would protect vulnerable people before harm is done.<\/p>\n\n\n\n<p>\ud83d\udd17\u00a0<a href=\"http:\/\/arxiv.org\/abs\/2604.11752\" target=\"_blank\" rel=\"noreferrer noopener\">Archived preprinted version of the paper on arXiv<\/a><\/p>\n\n\n\n<p>\ud83d\udd17 <a href=\"https:\/\/covacci.org\/undergraduate-research\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more about the COVA CCI Undergraduate Research Program<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">\ud83e\uddea <span style=\"text-decoration: underline\">Secure File Sharing System <\/span>(CYSE 250)<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>Technologies: Python, Socket Programming, CLI, Encryption (Caesar Cipher)<\/em><\/p>\n\n\n\n<p>Developed a secure file sharing system using Python, implementing core cybersecurity principles through a TCP-based client-server architecture. The system integrates encryption, authentication, and file isolation to ensure secure data handling and controlled user access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd0d Project Highlights<\/h2>\n\n\n\n<ul>\n<li>Built a <strong>TCP client-server architecture<\/strong> using Python socket programming<\/li>\n\n\n\n<li>Implemented <strong>user authentication system<\/strong> with persistent credential handling<\/li>\n\n\n\n<li>Applied <strong>encryption\/decryption (Caesar cipher)<\/strong> for secure data transmission<\/li>\n\n\n\n<li>Designed <strong>isolated file storage per user<\/strong> to enforce access control<\/li>\n\n\n\n<li>Developed <strong>command-line interface (CLI)<\/strong> for user interaction and system navigation<\/li>\n\n\n\n<li>Managed file operations including upload, retrieval, and storage securely<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Security Concepts Applied<\/h2>\n\n\n\n<ul>\n<li>Secure client-server communication<\/li>\n\n\n\n<li>Basic encryption and data protection<\/li>\n\n\n\n<li>Authentication and access control<\/li>\n\n\n\n<li>File system security and isolation<\/li>\n\n\n\n<li>Input handling and system interaction<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 What This Project Demonstrates<\/h2>\n\n\n\n<p>This project demonstrates the ability to translate cybersecurity concepts into a working system, combining networking, programming, and security principles into a functional application.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\uddbc\ufe0f System Demonstration<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/github.com\/CLochstampfor60\/file_system_project\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" data-attachment-id=\"1737\" data-permalink=\"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-foundations\/cyse-250\/secure_file_sharing_system_thumbnail\/\" data-orig-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?fit=471%2C556&amp;ssl=1\" data-orig-size=\"471,556\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Secure_File_Sharing_System_thumbnail\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?fit=300%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?fit=1000%2C1000&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail-1024x1024.jpg?resize=1000%2C1000&#038;ssl=1\" alt=\"\" class=\"wp-image-1737\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=1024%2C1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=1536%2C1536&amp;ssl=1 1536w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=2048%2C2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=144%2C144&amp;ssl=1 144w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/><\/a><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Click Image or Button to view source code and implementation details on GitHub.<\/em><\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #000000; \" class=\"wp-social-link wp-social-link-chain has-white-color has-black-background-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/CLochstampfor60\/file_system_project\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">View Source Code on GitHub<\/span><\/a><\/li><\/ul>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><code>\ud83c\udf10<\/code><span style=\"text-decoration: underline\">Ethernet Network Design Project <\/span>(IT 315)<\/h2>\n\n\n\n<p>Designed a complete Ethernet network infrastructure for a four-level building, including structured cabling, switching architecture, and security implementation. This project simulated a real-world network deployment scenario, requiring both technical design decisions and cost-performance tradeoff analysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd0d Project Highlights<\/h2>\n\n\n\n<ul>\n<li>Designed a <strong>hierarchical star topology<\/strong> with centralized equipment room and distributed telecommunications closets<\/li>\n\n\n\n<li>Planned and calculated <strong>148 network drops<\/strong> across a multi-floor environment<\/li>\n\n\n\n<li>Implemented <strong>Cat6 structured cabling<\/strong> with distance constraints aligned to industry standards<\/li>\n\n\n\n<li>Designed a <strong>fiber backbone (OM3 multimode)<\/strong> for scalability and high-speed interconnects<\/li>\n\n\n\n<li>Selected and integrated <strong>managed PoE switches<\/strong> for network segmentation and device support<\/li>\n\n\n\n<li>Configured a <strong>pfSense firewall (Netgate 6100)<\/strong> for network security, VLAN segmentation, and potential IDS\/IPS<\/li>\n\n\n\n<li>Integrated <strong>Wi-Fi 6 access points<\/strong> for modern wireless coverage<\/li>\n\n\n\n<li>Developed a <strong>cost-optimized bill of materials (~$13,591)<\/strong> balancing performance and budget<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 Applied Networking &amp; Security Concepts<\/h2>\n\n\n\n<ul>\n<li>Network topology design and hierarchical infrastructure<\/li>\n\n\n\n<li>Structured cabling standards (Cat6, ANSI\/TIA-568 alignment)<\/li>\n\n\n\n<li>VLAN segmentation and network isolation<\/li>\n\n\n\n<li>Firewall-based security architecture<\/li>\n\n\n\n<li>Scalability planning using fiber backbone<\/li>\n\n\n\n<li>Real-world budgeting and hardware selection<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 What This Project Demonstrates<\/h2>\n\n\n\n<p>This project demonstrates the ability to design and justify a complete enterprise network from the ground up \u2014 translating real-world physical and budget constraints into a scalable, secure, and professionally documented infrastructure solution. It reflects applied knowledge of networking standards, security architecture, and hardware selection in a simulated deployment environment.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Ethernet_Network_Design_Project_FD.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Ethernet_Network_Design_Project_FD<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>\ud83d\udc49 <strong>Download Project Report (PDF)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-2 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Ethernet_Network_Design_Project_FD.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Ransomware Mitigation Strategies for Windows Systems (CYSE 280)<\/h2>\n\n\n\n<p><em>Technologies &amp; Frameworks: Windows Server 2016\/2019\/2022, Windows Defender, WSUS, AppLocker, GPOs, NIST CSF, 3-2-1 Backup Strategy<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This research paper examines ransomware mitigation strategies for Windows servers and endpoints, using the BlackByte (2024) and WannaCry (2017) attacks as case studies. It analyzes the ransomware lifecycle, evaluates technical countermeasures, and provides actionable recommendations grounded in NIST&#8217;s Cybersecurity Framework and industry best practices.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd0d Project Highlights<\/h2>\n\n\n\n<ul>\n<li>Analyzed <strong>two real-world ransomware case studies<\/strong> \u2014 WannaCry (2017) and BlackByte (2024) \u2014 identifying attack vectors, tools, and outcomes<\/li>\n\n\n\n<li>Applied the <strong>NIST CSF five-function model<\/strong> (Identify, Protect, Detect, Respond, Recover) to structure a comprehensive mitigation framework<\/li>\n\n\n\n<li>Evaluated <strong>Windows-native security tools<\/strong> including Defender, AppLocker, WSUS, GPOs, and Event Logs<\/li>\n\n\n\n<li>Developed a <strong>comparison table<\/strong> of tools, functionality, mitigation impact, and implementation complexity<\/li>\n\n\n\n<li>Proposed <strong>12 actionable recommendations<\/strong> covering backups, EDR solutions, network segmentation, authentication, and employee training<\/li>\n\n\n\n<li>Created <strong>custom flowcharts<\/strong> illustrating ransomware detection, response, and recovery phases<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Security Concepts Applied<\/h2>\n\n\n\n<ul>\n<li>Ransomware lifecycle analysis (infection, propagation, execution, impact, recovery)<\/li>\n\n\n\n<li>Crypto vs. Locker ransomware differentiation<\/li>\n\n\n\n<li>EternalBlue SMB exploit and MS17-010 patch management<\/li>\n\n\n\n<li>3-2-1 backup strategy and immutable\/air-gapped storage<\/li>\n\n\n\n<li>Endpoint Detection and Response (EDR) implementation<\/li>\n\n\n\n<li>Phishing simulation and human factors integration<\/li>\n\n\n\n<li>RaaS (Ransomware-as-a-Service) threat modeling<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 What This Paper Demonstrates<\/h2>\n\n\n\n<p>This paper demonstrates the ability to conduct applied cybersecurity research at a professional level \u2014 analyzing real-world attack scenarios, evaluating technical defense frameworks, and translating NIST standards into practical, organization-ready recommendations for Windows environments.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/08\/CYSE-280-Final-Research-Paper-FD-submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-280-Final-Research-Paper-FD-submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-3 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/08\/CYSE-280-Final-Research-Paper-FD-submission.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span style=\"text-decoration: underline\">Shell Scripting, Redirection, &amp; Directory Checking<\/span> (CYSE 270)<\/h2>\n\n\n\n<p>\ud83d\udc27 Completed as part of CYSE 270: Linux for Cybersecurity, this lab demonstrates practical bash shell scripting in a Linux environment. Tasks included writing conditional logic scripts (if\/else), automating file creation and existence checking, validating directory structures, and applying redirection operators \u2014 all fundamental skills for Linux-based cybersecurity administration and automation.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/07\/Lab-8-Shell-Scripting-fd.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Lab-8-Shell-Scripting-fd<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-4 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/07\/Lab-8-Shell-Scripting-fd.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span style=\"text-decoration: underline\">Ensuring Accessibility when Implementing the CIA Triad <\/span>(CYSE 200T)<\/h2>\n\n\n\n<p>\ud83d\udccb This analytical paper argues that cybersecurity policies must proactively address accessibility gaps when implementing the CIA Triad \u2014 Confidentiality, Integrity, and Availability. Drawing on social science research and Human Factors Cybersecurity Engineering (HFCE) principles, it proposes policy frameworks using assistive technologies and human-centered design (HCD) to reduce the digital divide for older adults and people with disabilities in an increasingly digital-first society.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\ud83d\udccc Key Arguments &amp; Topics Covered<\/strong><\/h2>\n\n\n\n<ul>\n<li>Accessibility gaps in CIA Triad implementation for older adults and people with disabilities<\/li>\n\n\n\n<li>Human Factors Cybersecurity Engineering (HFCE) and human-centered design (HCD) as policy solutions<\/li>\n\n\n\n<li>Role of assistive technologies (biometric MFA, text-to-speech, screen readers) in closing the digital divide<\/li>\n\n\n\n<li>Policy recommendations aligned with WCAG 2.1, the EU Web Accessibility Directive, and Canada&#8217;s Accessible Canada Act<\/li>\n\n\n\n<li>Societal and economic benefits of inclusive cybersecurity infrastructure<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\ud83e\udde0 What This Paper Demonstrates<\/strong><\/h2>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This paper demonstrates the ability to analyze the societal impact of technical cybersecurity systems through an interdisciplinary lens \u2014 connecting policy, social science, and security engineering to argue for more equitable and human-centered design standards.<\/p>\n<\/blockquote>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\"><a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/04\/CYSE-200-Analytical-Paper-FD-2.0-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-200-Analytical-Paper-FD-2.0-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-5 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/04\/CYSE-200-Analytical-Paper-FD-2.0-1.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span style=\"text-decoration: underline\">Human Factors Cybersecurity Engineering:<\/span> <span style=\"text-decoration: underline\">Inclusive Design through Social Science<\/span> (CYSE 201S)<\/h2>\n\n\n\n<p>\ud83e\udd1d This research paper examines the Human Factors Cybersecurity Engineering (HFCE) career field and its deep reliance on social science to build secure, inclusive digital systems. It explores how core concepts \u2014 self-efficacy, risk perception, human-computer interaction (HCI), and human-centered design (HCD) \u2014 guide practitioners in designing accessible technologies that empower older adults and people with disabilities to engage confidently and safely in today&#8217;s digital world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\ud83d\udccc Key Arguments &amp; Topics Covered<\/strong><\/h2>\n\n\n\n<ul>\n<li>How Human Factors Cybersecurity Engineers (HFCEs) apply social science principles in daily practice<\/li>\n\n\n\n<li>Self-efficacy, risk perception, HCI, and HCD as frameworks for inclusive security design<\/li>\n\n\n\n<li>Assistive technologies (screen readers, voice recognition, wearables) and their role in bridging the digital divide<\/li>\n\n\n\n<li>Impact of HFCE work on marginalized groups including older adults and people with disabilities<\/li>\n\n\n\n<li>SETA program design and gamification as tools for reducing human error in cybersecurity<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\ud83e\udde0 What This Paper Demonstrates<\/strong><\/h2>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This paper demonstrates the ability to connect cybersecurity career practice with social science research \u2014 examining how human factors engineering addresses real-world accessibility and equity challenges across diverse user populations.<\/p>\n<\/blockquote>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\"><a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/04\/CYSE-201-Career-Paper-FD-2.0-2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-201-Career-Paper-FD-2.0-2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-6 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/04\/CYSE-201-Career-Paper-FD-2.0-2.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Curated cybersecurity milestone projects from ODU student Carl Lochstampfor Jr., featuring network security, Python programming, and applied research.<\/p>\n","protected":false},"author":30379,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advanced_seo_description":"Curated cybersecurity milestone projects from ODU student Carl Lochstampfor Jr., featuring network security, Python programming, and applied research.","jetpack_seo_html_title":"Milestone Projects | Carl Lochstampfor Jr. Cybersecurity Portfolio","jetpack_seo_noindex":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/2223"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=2223"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/2223\/revisions"}],"predecessor-version":[{"id":2466,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/2223\/revisions\/2466"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=2223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}