Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
Published:
Published:
N/A
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
All in all, I enjoyed this module. I was extremely busy at times and towards the end of the module, I found the workload to be a true test of my perserverance, focus, and endurance. That said, I am glad that I didn’t just try to mindlessly clear out as much work as possible. Where I could, I tried to bring my own ideas and personality into my work- usually by applying my own line of questioning to the work I was doing. I feel that has improved my critical thinking skills significantly, and I’m glad I made the most of the module under the constraints that I experienced.
Published:
This week, a debate was held regarding the future of the internet. I found this to be an interesting exercise because teams were given specific points to defend, making it necessary to find benefits in even the most unconventional options. This was a good exercise in researching, in my opinion.
Published:
During preparation for the seminar session, I started to think about the nature of GDPR aims, because the case I investigated, happened before the implementation of data protection and privacy laws. This meant that by today’s standards, the response to the breach was completely unacceptable- no affected users were informed and no other countermeasures were taken.
Published:
Gaming is my favourite hobby, and I frequently replay fairly old games for nostalgia. I recently started playing Call of Duty: Black Ops II on my computer, and after some reading on the forums, I realized that it has a critical vulnerability- an attacker can execute arbitrary code on a player’s computer. This vulnerability is confirmed and has its own CVE ID, along with a CVSS vulnerability rating of 9.8, which is critical (NIST, 2019).
Published:
During the seminar, we had an interesting discussion on the security of various content management systems. Ian Wolloff vouched for wordpress and mentioned that he is using it to serve 10000+ daily interactions. There was also mention of something called a “Headless CMS”, which is something I’m not familiar with, and will research further when I have time.
Published:
The majority of work done this week was the scanning exercises. As someone unfamiliar with different vulnerability scanning tools, I found these exercises useful.
Published:
This week, the team’s design document had to be submitted, which was the first assignment due for this module. What I enjoyed most about the assignment was the fact that I grasped the learning outcomes well enough to be able to go beyond what was taught and show critical thinking. Although this made the assignment harder in some ways, I believe it showed that myself, and my team, are able to think and reason about problems at the correct level for this degree.
Published:
Overall, I have enjoyed working with my team, and really valued their input and ideas on how the project could be made better. As the team leader, I think I’ve been handling the responsibilities well- by taking over the writing and summarising, the rest of the team was free to put their ideas on paper without having to worry about doing something less exciting- I will need to research this to confirm it, but I am confident that this approach helped my team to be more productive. One thing I would like to research (when time allows) is how to work efficiently when you are rushed.
Published:
For the seminar, I worked with Hendrik on preparing slides. Inside the slides, we added the outputs of our website scans, and also included our thoughts on TCP/IP vs ISO/OSI standards. We had an informal discussion about our finding, and it was interesting to see the difference in thought processes for answering the question.
Published:
The website analysis exercise was interesting. I am aware of more complex, specialised tools being used for hacking (e.g. Ophcrack for passwords), but I did not know that basic command-line Linux tools also have a role to play. Therefore, I wanted to find out how exactly they fit into modern-day website security. I discovered that these tools are an important part of the “Information Gathering” phase in vulnerability assessments/penetration tests (Gianchandani, 2018). An example provided by the aforementioned author is that these tools can be used to discover subdomains or provide a starting point from which vulnerable servers can be find. This is something I would like to explore in further detail for the project due in Unit 12.
Published:
This week, we focused on aligning our schedules. The team is distributed over 3 timezones, so discussions were had over Discord regarding what schedule to use. Eventually, we were able to come to an arrangement, deciding to meet on Sundays at 2pm BST. I also wanted to have midweek standups done via a voice call, but it would not be possible to have everyone join a call during a weekday, so I thereafter suggested doing a standup via text posting. Voice calls for standups are beneficial because blockers can be resolved instantly, and in my research for finding an alternative, I found that asyncrhonous communication can negatively influence coordination (Ahmad et al., 2018). As a result, I think it’ll be worthwhile to make sure the Sunday discussions are longer so that tasks are easier to complete during the week. I’ll also keep looking for other research to improve team cohesion.
Published:
The majority of insights I gained were mainly from the “Practical Information Security Management” book, written by Tony Campbell.
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
Published:
As companies become increasingly digitalized, their risk of security breaches also increases. Many companies are now beginning to prioritize their cybersecurity in an attempt to safeguard their data, and one technology which may assist these companies is blockchain. Blockchain is an emerging technology which enhances the way we interact with data, due to its transparent and secure nature. It relies on a decentralized network of devices containing an identical record of transactions or data (PwC, 2021), which adds data to the network based on consensus, trust, and computationally intensive algorithms, making it effectively impossible to create a fraudulent transaction, revert the state of the data, or harm data integrity.
Published:
Despite the challenges, unit 12 was my favorite of all. The end-of-module assignment was an introduction to the world of academic writing and helped me to learn a new way of thinking. Having never done it before, there was a period of adjustment. I started the assignment very early, but made the mistake of writing first, before fully exploring the theme I selected and the related niches. I found that academic research is extremely detailed in nature, and not spending enough time learning the various niches and terminologies, makes it harder to write a paper. I initially found papers relevant to my topic and used them as the basis of my essay, however, after I continued to read and study all the related academic literature, I realized that I would have to start my paper again from scratch, because the inital frameworks were not fully appropriate for the case study I selected; they were too vague and did not make it possible to clearly identify areas for improvement. In light of this, I decided to change my strategy and focused on reading the content of entire papers with the aim of building a “mental model” of the topic, and connecting niche subtopics to that main topic. This helped me to determine what terminology to use when looking for papers, and also helped a lot in making my logic clear and easy to understand, regardless of whether the reader has experience in the area of research or not.
Published:
The aim of this task was to discover the process of loading a webpage. Based on experience with bad internet connections, I’ve always thought the process was loading HTML first, then CSS, then Javascript. If a connection I’ve used was slow or unstable, what would usually happen is that the HTML would load, but be completely unstyled. Sometimes it would only be partially styled. After that, CSS would load, and then Javascript- I would be able to tell if Javascript loaded because webpage elements (e.g. text in expandable sections) would start being hidden. This is somewhat correct; according to Kantor (2021), there are two phases to loading a webpage. The first is where the HTML is fully parsed and loaded, but resources not present in the HTML are yet to be loaded. This would include things such as CSS/JS files and images. Finally, in the second phase, these files are loaded and rendered. Typically, the browser will make requests to retreive and render this data. This can be shown by using a Chromium-based browser and pressing CTRL+SHIFT+I, then opening the Network tab and loading a webpage. All the data required to render a webpage fully is shown on the right. A screenshot is shown below:
Published:
I originally began working on the units’ content separately, but as I continued, I realized my approach to the content created a lot of overlap between the units’ activities; for this reason, I decided to merge their content.
Published:
Published:
Published:
SQL is quite nice to work with as a language because of how close it is to natural English. This thought prompted me to read more about the theory behind it to better understand why it’s so effective, and this led me to discover the concept of declarative programming. Declarative programming is a form of programming that is built around the concept of a developer merely expressing their intentions code, while any complex logic involved in achieving that intention is left to the computer. A good example of this is the use of the WHERE clause in SQL. Rather than write loops with conditionals which would allow you to select specific entries, you would simply write WHERE, and SQL would decide how to approach this request by creating a query plan (a query plan can be thought of as the lower level instructions generated to execute a given query).
Published:
The task for this unit was to investigate and explore the potential of Google Translate.
Published:
This blog post aims to clear up backpropagation in neural networks and give a more intuitive understanding of how it works. Before starting, recall that the goal of a neural network is to learn the weights $W$ and biases $b$ that minimize some loss function $L$.
Detecting forged banknotes with a neural network.
ePortfolio for the Network and Information Security Management module.
ePortfolio for the Object Oriented Information Systems module.
ePortfolio for the Research Methods and Professional Practice module.
ePortfolio for the Secure Software Development module.
ePortfolio for the Software Engineering Project Management module.
Published in Journal 1, 2009
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://academicpages.github.io/files/paper1.pdf
Published in Journal 1, 2010
This paper is about the number 2. The number 3 is left for future work.
Recommended citation: Your Name, You. (2010). "Paper Title Number 2." Journal 1. 1(2). http://academicpages.github.io/files/paper2.pdf
Published in Journal 1, 2015
This paper is about the number 3. The number 4 is left for future work.
Recommended citation: Your Name, You. (2015). "Paper Title Number 3." Journal 1. 1(3). http://academicpages.github.io/files/paper3.pdf
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.