{"id":202,"date":"2025-08-09T15:21:57","date_gmt":"2025-08-09T15:21:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/my-nguyen\/?page_id=202"},"modified":"2025-08-09T22:41:32","modified_gmt":"2025-08-09T22:41:32","slug":"ethical-analysis","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/my-nguyen\/ethical-analysis\/","title":{"rendered":"Networking &amp; Systems Administration"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Artifact 1: <strong>Secure File Transfer Using Python<\/strong><\/h2>\n\n\n\n<p>This project demonstrates building a secure file transfer system with Python, combining socket programming and encryption to ensure safe communication and data protection. It highlights my hands-on skills in programming and network security.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Milestone_1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Milestone_1.\"><\/object><a id=\"wp-block-file--media-9f7e27d5-2360-4dad-b187-0abb0423d1ca\" href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Milestone_1.pdf\">Milestone_1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Milestone_1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9f7e27d5-2360-4dad-b187-0abb0423d1ca\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 2: Shell Scripting<\/h2>\n\n\n\n<p>Shell scripting enables efficient automation of system tasks, allowing rapid configuration, monitoring, and troubleshooting in cybersecurity environments. Through my coursework, I have developed scripts to automate security checks, streamline system management, and respond quickly to potential threats, demonstrating practical command over Linux and networking tools.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Shell-Scripting.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Shell-Scripting.\"><\/object><a id=\"wp-block-file--media-3af636b6-efa7-414c-9c7c-524296f0d150\" href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Shell-Scripting.pdf\">Shell-Scripting<\/a><a href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Shell-Scripting.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3af636b6-efa7-414c-9c7c-524296f0d150\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 3: <strong>AI Applications in Cybersecurity Research<\/strong><\/h2>\n\n\n\n<p>This research paper explores how artificial intelligence can transform cybersecurity by enhancing threat detection, behavioral analysis, and automated response. It showcases my ability to analyze emerging technologies and their potential impact on protecting digital systems.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Research_Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Research_Paper.\"><\/object><a id=\"wp-block-file--media-e9c60bae-4669-4b78-ba67-46538f87ccf7\" href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Research_Paper.pdf\">Research_Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Research_Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e9c60bae-4669-4b78-ba67-46538f87ccf7\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Artifact 1: Secure File Transfer Using Python This project demonstrates building a secure file transfer system with Python, combining socket programming and encryption to ensure safe communication and data protection. It highlights my hands-on skills in programming and network security. Artifact 2: Shell Scripting Shell scripting enables efficient automation of system tasks, allowing rapid configuration,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/ethical-analysis\/\">Read More<\/a><\/div>\n","protected":false},"author":28558,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/pages\/202"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/users\/28558"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/pages\/202\/revisions"}],"predecessor-version":[{"id":268,"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/pages\/202\/revisions\/268"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/media?parent=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}