Coursework was completed for CYSE 300 and IDS300W at Old Dominion University, Fall 2025.
Threat analysis and security evaluation are critical components of cybersecurity, requiring the ability to identify vulnerabilities, assess risk, and recommend effective security measures across complex systems. Through my academic work in both courses CYSE300 and IDS300W, I have developed the ability to analyze both technical and organizational security challenges, applying structured frameworks to real-world scenarios. My experience integrates interdisciplinary research, case study analysis, and security policy development to evaluate threats and propose practical solutions. These artifacts demonstrate my ability to assess cybersecurity risks at both the system and enterprise levels.
Military Telemedicine Cybersecurity Analysis (IDS 300W)
This interdisciplinary research examines cybersecurity risks in military telemedicine systems within combat environments. I identified key vulnerabilities such as insecure devices, weak authentication, and reliance on unstable networks, all of which expand the attack surface.
The analysis concluded that effective security requires a balanced approach combining strong technical controls with real world combat environments. My ability to evaluate complex systems and develop practical security solutions was definitely tested, and I appreciated the challenge.
Equifax Data Breach Analysis (2017) (CYSE 300)
This paper analyzes the Equifax data breach, one of the largest cybersecurity incidents in U.S. history, where the personal data of approximately 145 million individuals was compromised. I identified delayed patch management as the primary failure, as Equifax failed to remediate a known vulnerability for over two months after notification. This allowed attackers to exploit the system and maintain access undetected.
This paper was significant because this was my first semester down the cybersecurity major and pipeline. Through this analysis, I looked at this compromise of data through a new lens. I always look forward to learning new topics and information, and this was one of the several steps on my new career path of cybersecurity.
Information Systems Security Policies (2017) (CYSE 300)
This paper improved my understanding of layered defense strategies within information systems and had me evaluate and design practical security solutions to reduce risk in real world systems. While this was a more basic and straightforward research paper, it was a strong starting point into learning more about information systems security and implementing that baseline knowledge.