ODU Logo

mahad

Student Name

Category Uncategorized

A Comprehensive Reflection on My Cloud Development Internship at Old Dominion University

Mahad Ahmad Digital Transformation and Technology (DTT) Division at Old Dominion University CYSE 368 – Cybersecurity Internship – Fall 2025 Prof. Teresa Duvall December 1, 2025 Contents 1. Introduction Completing an internship is often the most practical way for a… Continue Reading →

Reflection Paper 3

Third 50 Hours During my third phase of internship hours, I made the most meaningful progress I have achieved so far. I transitioned away from the older, packaged OWASP ZAP scans and fully adopted the newer ZAP Automation Framework. This… Continue Reading →

Reflection Paper 2

Second 50 Hours Working as a Cloud Development Intern for the second 50 hours has helped me move from learning the basics of OWASP ZAP integration to refining and expanding on what I built earlier. I continued developing the security… Continue Reading →

Reflection Paper 1

First 50 Hours Working as a Cloud Development Intern at Old Dominion University for 50 hours has given me a clear view of how security testing and continuous integration intersect in a real-world environment. My main responsibility so far has… Continue Reading →

Journal Entries

Week 15 – Journal Entry 15 Week 13 – Journal Entry 14 Week 12 – Journal Entry 13 Week 12 – Journal Entry 12 Week 11 – Journal Entry 11 Week 11 – Journal Entry 10 Week 8 – Journal… Continue Reading →

Article Reviews

Article Review #1: Cyberbullying on Social Media: Definitions, Prevalence, and Impact on Marginalized Groups Article Review #2: Cybersecurity Literacy Programs for Marginalized Communities: Bridging the Gap in Digital Security

Career Paper

How Social Science Shapes Security Engineering in Cybersecurity IntroductionCybersecurity may seem like a field driven solely by technical expertise, butprofessionals in this space increasingly rely on social science to do their jobs effectively.Security engineers, in particular, work at the intersection… Continue Reading →

Week 15 – Journal Entry 15

Listening to the speaker’s story, I realized how much digital forensics overlaps with social sciences. His work isn’t just about technical skills; it’s about understanding human behavior, motivations, and social environments to track actions like fraud, threats, and misconduct. His… Continue Reading →

Week 13 – Journal Entry 14

The five most serious online violations are illegal streaming, torrenting copyrighted content, doxxing, cyberbullying, and conducting illegal searches. These aren’t just minor slip-ups; they can lead to real legal trouble and cause serious harm. Streaming and torrenting violate copyright laws… Continue Reading →

Week 12 – Journal Entry 13

The article offers a clear analysis of bug bounty programs and their role in cybersecurity policy, especially through the lens of economic cost-benefit principles. In the literature review, the authors explain that these programs allow federal agencies to invite ethical… Continue Reading →

« Older posts

© 2025 mahad — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑