• Welcome to my Cybersecurity Journal
  • Blog
  • IDS 493
  • Skills
  • Resume
  • Contact

Cybersecurity Journal

Stephen Cobb

Research and Writing

Welcome to my research and writing page! I view research and writing as an ongoing journey of discovery and learning. Each research project is an opportunity to explore new ideas, ask meaningful questions, and integrate insights from a variety of sources. It’s about carefully analyzing, evaluating, and weaving together knowledge into cohesive and compelling narratives. For me, writing is a tool to share ideas, educate, and persuade, emphasizing clarity and precision to make complex topics accessible to everyone. In this ePortfolio, you’ll find examples that showcase my dedication to in-depth research and impactful writing.

IDS 300w Final paper
This research explores the cybersecurity vulnerabilities associated with water treatment facilities in the United States and examines how machine learning can mitigate these risks. Critical systems like SCADA and industrial control systems are essential to water treatment operations but are vulnerable to cyber threats, including insider attacks, weak external connections, and unpatched software. Machine learning offers solutions like anomaly detection, predictive analysis, and automated responses, enabling real-time identification of threats and improved security. However, challenges remain, such as the risk of machine learning data manipulation and the complexities of implementing these technologies on a national scale. The research underscores the importance of securing water treatment systems as critical infrastructure, emphasizing interdisciplinary approaches that integrate cybersecurity expertise, water treatment knowledge, and machine learning capabilities to enhance resilience against cyber-attacks.

IDS 300w Final
IDS-300w-final.docx

CYSE 425w

This paper is about the significant cybersecurity and physical vulnerabilities associated with the U.S. electrical grid and the severe societal and economic consequences that could result from attacks. These threats include physical sabotage, such as domestic terrorism, and cyberattacks that could lead to prolonged power outages, disrupting critical services like hospitals, traffic systems, fuel distribution, and daily life. The growing risks demand robust preventive measures, such as implementing the CIA triad (confidentiality, integrity, availability), enhancing communication protocols, and establishing dedicated security systems for interconnected grids. Policy initiatives like the National Cybersecurity Strategy emphasize protecting critical infrastructure, but a cultural shift toward proactive and resilient grid management is essential. Regular system updates, improved coordination among networks, and eliminating weak points are critical steps to mitigate vulnerabilities, prevent mass blackouts, and safeguard societal stability.

CYSE 425w
Policy-analysis-paper-4.docx

CYSE 280 Research Paper
This paper explores how artificial intelligence (AI), particularly fuzzy logic, is revolutionizing the fight against air pollution. AI is being used to monitor and analyze air quality through sensors, drones, and predictive models, making it possible to detect gas leaks, monitor real-time pollution levels, and identify areas where air pollution exceeds legal limits. Fuzzy logic, a subset of AI, is instrumental in addressing the complexities of air pollution by categorizing pollutants and generating actionable insights. This approach allows for the development of air quality indices that provide accurate, real-time assessments, including indoor air quality, which often surpasses outdoor levels in pollutant concentration. By integrating AI tools with public awareness campaigns and advanced monitoring systems, governments and communities can take decisive action to reduce pollution and its health impacts. The research highlights the potential of AI-driven solutions to create meaningful environmental changes and advocates for their widespread implementation to combat air pollution effectively.

CYSE 280 Research Paper
CYSE-280-research-paper.docx

Facebooktwitterlinkedininstagramflickrfoursquaremailby feather
Leave a comment

CRITICAL THINKING

Critical thinking serves as the compass for my academic and professional endeavors, enabling me to analyze, evaluate, and synthesize information from a wide range of sources. It is more than just a skill it is a mindset that drives me to question assumptions, explore innovative solutions, and make informed decisions. Rather than being a fixed destination, critical thinking is a continuous journey that enhances my problem-solving abilities and reinforces my dedication to lifelong learning and growth.

In the multifaceted field of Cybersecurity, which intersects with disciplines such as Criminal Justice, Network Management, Political Science, and Forensics, I have consistently demonstrated my capacity to find creative solutions, identify relevant sources, and integrate diverse perspectives. My ePortfolio features artifacts that showcase my commitment to applying critical thinking to tackle complex challenges and advance in this dynamic field.

Cyber Terrorism Infographic Slides
As technology integrates deeper into daily life, critical systems like financial transactions, power grids, and gas pipelines face rising risks from cyber-attacks. These attacks could disrupt economies, compromise essential services, and harm millions. With global tensions escalating and the U.S. being a leading power alongside nations like Russia and China, cyber terrorism could emerge as a key war tactic. A single, well-executed attack could paralyze a nation for weeks, highlighting the urgent need for preparedness and cybersecurity measures. I criticality thought about the future of cyber terrorism.

CYSE 495 Infographic Slides
CYSE-495-infographic-Slides.pptx

TinkerCad Project
This project consisted of three key checkpoints aimed at designing and assembling a 3D house using TinkerCad. The final checkpoint required creating and submitting a parts list and assembly instructions for the house. This involved disassembling the 3D model, labeling the components, and producing a clear assembly guide with basic steps. Additionally, a two-page report was required to reflect on the overall experience across the three checkpoints.

Initially, the project began with Checkpoint 1, which focused on sketching the house design on paper. This was straightforward and enjoyable, involving clean lines and conceptualizing features like windows, doors, and a garage. Checkpoint 2 introduced challenges as the design moved to TinkerCad. Building the digital model was difficult, particularly aligning components, creating precise holes for windows and doors, and managing spacing. Despite being sick during this phase, perseverance and patience helped complete the digital model, leading to a satisfactory result.

Checkpoint 3 was less challenging and involved breaking down the 3D model into individual components for labeling and creating assembly instructions. This task demonstrated the effort and accuracy of the previous work. Overall, the project provided valuable lessons in problem-solving, precision, and patience. While the process was stressful at times, it was rewarding to see the house come together and to complete the project successfully.

TinkerCad Project
Construction-Project-Checkpoint-3-1.docx

IT 201 Course Project

Throughout the IT 201 course project, I developed a comprehensive business model based on leveraging information technology for a successful DJ service. The project involved researching and applying key IT systems such as transaction processing systems, customer relationship management (CRM), and business intelligence tools to streamline operations, predict market trends, and enhance customer satisfaction. A global e-business approach was emphasized, incorporating demand-to-supply processes, efficient order handling, and effective use of telecommunications and social media for collaboration and customer engagement. The project also explored ethical principles, IT infrastructure choices, and cybersecurity measures, such as malware detection and secure device management, to ensure the business operates ethically, efficiently, and securely.

Further, I utilized strategies for achieving operational excellence, including CRM for customer loyalty and database management for tracking customer interactions. E-commerce strategies, such as newsletters, social media marketing, and user-friendly website design, were integrated to boost online sales. Decision-making was structured with tools like augmented reality to test designs before launch. Agile project management techniques were applied to build efficient, user-friendly information systems. This project demonstrated how IT can be harnessed to create a competitive and innovative business, preparing me to apply these skills in real-world scenarios.

IT 201 Course Project
cobb-IT201-course-project.docx

Facebooktwitterlinkedininstagramflickrfoursquaremailby feather
Leave a comment

Technical Skills

My career trajectory has been firmly grounded in technical skills, including the understanding and practice of specialized activities like programming and the utilization of digital technologies, which have served me well in today’s dynamic digital environment. During my time at university, I was able to hone these abilities via a combination of classroom study and work experience. I place a premium on being able to learn new things rapidly because I know how important it is to keep up with the ever-changing nature of industries and the tools and technology that support them. My desire to be an engaged agent of positive change in the dynamic digital world is driven by my dedication to lifelong learning.

Work Summaries

IT-315 Case Analysis
For the first technical skill, I had to rewire Maury High School by calculating the cabling requirements based on the building’s layout, which featured similar configurations across all floors. Using a star topology, I strategically placed telecommunications closets and determined the average cable lengths needed for efficient connectivity. The total cabling requirement was determined by multiplying the average cable length by the number of cables per floor. To complete the network setup, I included RJ45 outlets, wall plates, and patch panels for every room, along with managed switches for each floor. For network security, I installed a multifunctional firewall device to safeguard traffic. The project assumed that existing PCs were equipped with compatible network interface cards, and the final cost covered all materials required to set up a reliable and robust network infrastructure.

CYSE 301 Assignment #3 Sword vs. Shield
This report analyzes a cybersecurity lab exercise that involved both offensive and defensive techniques to evaluate and protect a network. The “Sword” task utilized tools like Nmap and Wireshark to conduct network scans and gather details on open ports, operating systems, and topology while observing traffic patterns and packet types, such as SYN, ACK, and ARP, to map the network. Techniques to avoid detection, like rate-limiting scans, were also discussed. The “Shield” task focused on configuring pfSense firewalls to block specific traffic types, such as ICMP and all non-FTP traffic from an external source to internal systems. The results demonstrated how these rules limited unauthorized access and enhanced network protection by preventing successful scans, showcasing effective strategies for both attacking and defending a network.

CYSE 270 Lab 11
This assignment involved configuring and analyzing basic network settings in a Linux environment to understand key aspects of network operations. The tasks included using tools like ifconfig, route, and netstat to examine and document network configurations, such as IP and MAC addresses, routing tables, and TCP connections. Commands like ping and host were used to test network connectivity and perform DNS queries. The configuration changes, such as shifting the system to a bridge adapter, demonstrated the impact on IP and gateway addresses. Additionally, file contents related to hostname and DNS servers were accessed and modified to reflect updated settings. Extra credit tasks involved analyzing a given IP address and subnet mask in binary and decimal formats to determine network and broadcast addresses, along with the range of usable IPs and maximum hosts in the network. This comprehensive exercise provided practical experience with Linux networking tools and concepts.

Technical Skills Examples

IT-315 Case Analysis

IT-315-case-analysis

CYSE 301 Assignment #3 Sword vs. Shield

Assignment-3-lab-report

CYSE 270 Lab 11

CYSE-Lab-11-Basic-Network-Configuration-Fall2022-.docx

IT-315 Case Analysis
CYSE 301 Assignment #3 Sword vs. Shield
CYSE 270 Lab 11
Facebooktwitterlinkedininstagramflickrfoursquaremailby feather
Leave a comment

Hello World!

This is a post. Use posts to update your blog.

Facebooktwitterlinkedininstagramflickrfoursquaremailby feather
Leave a comment

    Categories

    • Uncategorized

    WordPress Theme Custom Community 2 developed by Macho Themes

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept