Mahad Ahmad Digital Transformation and Technology (DTT) Division at Old Dominion University CYSE 368 – Cybersecurity Internship – Fall 2025 Prof. Teresa Duvall December 1, 2025 Contents 1. Introduction Completing an internship is often the most practical way for a… Continue Reading →
Third 50 Hours During my third phase of internship hours, I made the most meaningful progress I have achieved so far. I transitioned away from the older, packaged OWASP ZAP scans and fully adopted the newer ZAP Automation Framework. This… Continue Reading →
Second 50 Hours Working as a Cloud Development Intern for the second 50 hours has helped me move from learning the basics of OWASP ZAP integration to refining and expanding on what I built earlier. I continued developing the security… Continue Reading →
First 50 Hours Working as a Cloud Development Intern at Old Dominion University for 50 hours has given me a clear view of how security testing and continuous integration intersect in a real-world environment. My main responsibility so far has… Continue Reading →
Week 15 – Journal Entry 15 Week 13 – Journal Entry 14 Week 12 – Journal Entry 13 Week 12 – Journal Entry 12 Week 11 – Journal Entry 11 Week 11 – Journal Entry 10 Week 8 – Journal… Continue Reading →
Article Review #1: Cyberbullying on Social Media: Definitions, Prevalence, and Impact on Marginalized Groups Article Review #2: Cybersecurity Literacy Programs for Marginalized Communities: Bridging the Gap in Digital Security
How Social Science Shapes Security Engineering in Cybersecurity IntroductionCybersecurity may seem like a field driven solely by technical expertise, butprofessionals in this space increasingly rely on social science to do their jobs effectively.Security engineers, in particular, work at the intersection… Continue Reading →
Listening to the speaker’s story, I realized how much digital forensics overlaps with social sciences. His work isn’t just about technical skills; it’s about understanding human behavior, motivations, and social environments to track actions like fraud, threats, and misconduct. His… Continue Reading →
The five most serious online violations are illegal streaming, torrenting copyrighted content, doxxing, cyberbullying, and conducting illegal searches. These aren’t just minor slip-ups; they can lead to real legal trouble and cause serious harm. Streaming and torrenting violate copyright laws… Continue Reading →
The article offers a clear analysis of bug bounty programs and their role in cybersecurity policy, especially through the lens of economic cost-benefit principles. In the literature review, the authors explain that these programs allow federal agencies to invite ethical… Continue Reading →
© 2025 mahad — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑