Technical Writing: Incident Report
This report showcases my potential in being a proficient technical writer in describing incidents in a way a non-technical person can understand thoroughly. The scenario of this report states that,…
This report showcases my potential in being a proficient technical writer in describing incidents in a way a non-technical person can understand thoroughly. The scenario of this report states that,…
This report is was used to showcase my potential in becoming a proficient technical writer. I wrote this report under the circumstance of a company needing suggestions on how to…
Project description My organization is working to make their system more secure. It is my job to ensure the system is safe, investigate all potential security issues, and update employee…
Project description At my organization, access to restricted content is controlled with an allow list of IP addresses. The "allow_list.txt" file identifies these IP addresses. A separate remove list identifies…
This project consists of building a mini firewall built to utilize signature detection. Signature detection consists of capturing packets, inspecting the contents, and comparing to known malware. If malware is…
On November 24, 2014, one of the bigger scaled cyberattacks took place. "Guardians of Peace", which was a hacker group that was later reidentified as a National Korean Group, leaked…