Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Rmpp Unit 9

less than 1 minute read

Published:

Learning Outcomes Achieved

  1. Appraise the professional, legal, social, cultural and ethical issues that affect computing professionals
  2. Evaluate critically existing literature, research design and methodology for the chosen topic, including data analysis processes

Rmpp Unit 12

1 minute read

Published:

Learning Outcomes Achieved

  1. Appraise the professional, legal, social, cultural and ethical issues that affect computing professionals

Rmpp Unit 11

less than 1 minute read

Published:

Learning Outcomes Achieved

N/A

Rmpp Unit 10

4 minute read

Published:

Learning Outcomes Achieved

  1. Produce and evaluate critically the resulting research proposal for the chosen topic.

Rmpp Unit 8

2 minute read

Published:

Learning Outcomes Achieved

  1. Evaluate critically existing literature, research design and methodology for the chosen topic, including data analysis processes
  2. Produce and evaluate critically the resulting research proposal for the chosen topic.

Rmpp Unit 7

2 minute read

Published:

Learning Outcomes Achieved

  1. Appraise the professional, legal, social, cultural and ethical issues that affect computing professionals
  2. Appraise the principles of academic investigation, applying them to a research topic in the applicable computing field

Rmpp Unit 6

less than 1 minute read

Published:

Learning Outcomes Achieved

  1. Evaluate critically existing literature, research design and methodology for the chosen topic, including data analysis processes

Rmpp Unit 5

less than 1 minute read

Published:

Learning Outcomes Achieved

  1. Appraise the professional, legal, social, cultural and ethical issues that affect computing professionals

Rmpp Unit 4

less than 1 minute read

Published:

Learning Outcomes Achieved

  1. Appraise the professional, legal, social, cultural and ethical issues that affect computing professionals

Rmpp Unit 3

1 minute read

Published:

Learning Outcomes Achieved

  1. Appraise the professional, legal, social, cultural and ethical issues that affect computing professionals
  2. Evaluate critically existing literature, research design and methodology for the chosen topic, including data analysis processes

Rmpp Unit 2

less than 1 minute read

Published:

Learning Outcomes Achieved

  1. Appraise the professional, legal, social, cultural and ethical issues that affect computing professionals

Rmpp Unit 1

3 minute read

Published:

Learning Outcomes Achieved

  1. Appraise the professional, legal, social, cultural and ethical issues that affect computing professionals
  2. Appraise the principles of academic investigation, applying them to a research topic in the applicable computing field

Sepm Unit 12

1 minute read

Published:

Learning Outcomes Achieved

  1. Design, develop and evaluate management systems to produce solutions that handle constraints and uncertainty
  2. Systematically develop and implement the skills required to be effective member of a development team in a virtual professional environment, adopting real-life perspectives on roles and team organisation

Sepm Unit 11

4 minute read

Published:

Learning Outcomes Achieved

  1. Identify and apply appropriate software engineering and project management methodologies, tools and techniques for the development of solutions to real-world problems
  2. Explore the implications of computer and network architectures for system-level design and development, as appropriate for risk and quality management
  3. Systematically develop and implement the skills required to be effective member of a development team in a virtual professional environment, adopting real-life perspectives on roles and team organisation

Sepm Unit 10

2 minute read

Published:

Learning Outcomes Achieved

  1. Explore the implications of computer and network architectures for system-level design and development, as appropriate for risk and quality management

Sepm Unit 9

3 minute read

Published:

Learning Outcomes Achieved

  1. Explore the implications of computer and network architectures for system-level design and development, as appropriate for risk and quality management
  2. Systematically develop and implement the skills required to be effective member of a development team in a virtual professional environment, adopting real-life perspectives on roles and team organisation

Sepm Unit 8

2 minute read

Published:

Learning Outcomes Achieved

  1. Explore the implications of computer and network architectures for system-level design and development, as appropriate for risk and quality management

Sepm Unit 7

1 minute read

Published:

Learning Outcomes Achieved

  1. Design, develop and evaluate management systems to produce solutions that handle constraints and uncertainty

Sepm Unit 6

4 minute read

Published:

Learning Outcomes Achieved

  1. Identify and apply appropriate software engineering and project management methodologies, tools and techniques for the development of solutions to real-world problems
  2. Explore the implications of computer and network architectures for system-level design and development, as appropriate for risk and quality management
  3. Systematically develop and implement the skills required to be effective member of a development team in a virtual professional environment, adopting real-life perspectives on roles and team organisation

Sepm Unit 3

1 minute read

Published:

Learning Outcomes Achieved

  1. Identify and apply appropriate software engineering and project management methodologies, tools and techniques for the development of solutions to real-world problems
  2. Explore the implications of computer and network architectures for system-level design and development, as appropriate for risk and quality management

Sepm Unit 5

2 minute read

Published:

Learning Outcomes Achieved

  1. Identify and apply appropriate software engineering and project management methodologies, tools and techniques for the development of solutions to real-world problems
  2. Design, develop and evaluate management systems to produce solutions that handle constraints and uncertainty
  3. Systematically develop and implement the skills required to be effective member of a development team in a virtual professional environment, adopting real-life perspectives on roles and team organisation

Sepm Unit 4

4 minute read

Published:

Learning Outcomes Achieved

  1. Identify and apply appropriate software engineering and project management methodologies, tools and techniques for the development of solutions to real-world problems
  2. Explore the implications of computer and network architectures for system-level design and development, as appropriate for risk and quality management

Nism Unit 12

1 minute read

Published:

Reflection

All in all, I enjoyed this module. I was extremely busy at times and towards the end of the module, I found the workload to be a true test of my perserverance, focus, and endurance. That said, I am glad that I didn’t just try to mindlessly clear out as much work as possible. Where I could, I tried to bring my own ideas and personality into my work- usually by applying my own line of questioning to the work I was doing. I feel that has improved my critical thinking skills significantly, and I’m glad I made the most of the module under the constraints that I experienced.

Nism Unit 11

less than 1 minute read

Published:

Reflections

This week, a debate was held regarding the future of the internet. I found this to be an interesting exercise because teams were given specific points to defend, making it necessary to find benefits in even the most unconventional options. This was a good exercise in researching, in my opinion.

Nism Unit 10

less than 1 minute read

Published:

Reflections

During preparation for the seminar session, I started to think about the nature of GDPR aims, because the case I investigated, happened before the implementation of data protection and privacy laws. This meant that by today’s standards, the response to the breach was completely unacceptable- no affected users were informed and no other countermeasures were taken.

Nism Unit 9

1 minute read

Published:

Reflections

Gaming is my favourite hobby, and I frequently replay fairly old games for nostalgia. I recently started playing Call of Duty: Black Ops II on my computer, and after some reading on the forums, I realized that it has a critical vulnerability- an attacker can execute arbitrary code on a player’s computer. This vulnerability is confirmed and has its own CVE ID, along with a CVSS vulnerability rating of 9.8, which is critical (NIST, 2019).

Nism Unit 8

3 minute read

Published:

Seminar

During the seminar, we had an interesting discussion on the security of various content management systems. Ian Wolloff vouched for wordpress and mentioned that he is using it to serve 10000+ daily interactions. There was also mention of something called a “Headless CMS”, which is something I’m not familiar with, and will research further when I have time.

Nism Unit 7

less than 1 minute read

Published:

Reflections

The majority of work done this week was the scanning exercises. As someone unfamiliar with different vulnerability scanning tools, I found these exercises useful.

Nism Unit 6

1 minute read

Published:

Design Document

This week, the team’s design document had to be submitted, which was the first assignment due for this module. What I enjoyed most about the assignment was the fact that I grasped the learning outcomes well enough to be able to go beyond what was taught and show critical thinking. Although this made the assignment harder in some ways, I believe it showed that myself, and my team, are able to think and reason about problems at the correct level for this degree.

Nism Unit 5

less than 1 minute read

Published:

Reflections

Overall, I have enjoyed working with my team, and really valued their input and ideas on how the project could be made better. As the team leader, I think I’ve been handling the responsibilities well- by taking over the writing and summarising, the rest of the team was free to put their ideas on paper without having to worry about doing something less exciting- I will need to research this to confirm it, but I am confident that this approach helped my team to be more productive. One thing I would like to research (when time allows) is how to work efficiently when you are rushed.

Nism Unit 4

6 minute read

Published:

Seminar 2

For the seminar, I worked with Hendrik on preparing slides. Inside the slides, we added the outputs of our website scans, and also included our thoughts on TCP/IP vs ISO/OSI standards. We had an informal discussion about our finding, and it was interesting to see the difference in thought processes for answering the question.

Nism Unit 3

2 minute read

Published:

Reflections

The website analysis exercise was interesting. I am aware of more complex, specialised tools being used for hacking (e.g. Ophcrack for passwords), but I did not know that basic command-line Linux tools also have a role to play. Therefore, I wanted to find out how exactly they fit into modern-day website security. I discovered that these tools are an important part of the “Information Gathering” phase in vulnerability assessments/penetration tests (Gianchandani, 2018). An example provided by the aforementioned author is that these tools can be used to discover subdomains or provide a starting point from which vulnerable servers can be find. This is something I would like to explore in further detail for the project due in Unit 12.

Nism Unit 2

3 minute read

Published:

Group Discussions

This week, we focused on aligning our schedules. The team is distributed over 3 timezones, so discussions were had over Discord regarding what schedule to use. Eventually, we were able to come to an arrangement, deciding to meet on Sundays at 2pm BST. I also wanted to have midweek standups done via a voice call, but it would not be possible to have everyone join a call during a weekday, so I thereafter suggested doing a standup via text posting. Voice calls for standups are beneficial because blockers can be resolved instantly, and in my research for finding an alternative, I found that asyncrhonous communication can negatively influence coordination (Ahmad et al., 2018). As a result, I think it’ll be worthwhile to make sure the Sunday discussions are longer so that tasks are easier to complete during the week. I’ll also keep looking for other research to improve team cohesion.

Nism Unit 1

5 minute read

Published:

Unit Reading

The majority of insights I gained were mainly from the “Practical Information Security Management” book, written by Tony Campbell.

Ssd Unit 12

1 minute read

Published:

Reflection

Ssd Unit 11

7 minute read

Published:

Learning Outcomes Achieved

  1. Critically analyse development problems and determine appropriate methodologies, tools and techniques to solve them
  2. Design, develop and adapt programs and to produce a solution that meets the design brief and critically evaluate solutions that are produced

Ssd Unit 10

3 minute read

Published:

Unit 10

Ssd Unit 8

less than 1 minute read

Published:

Learning Outcomes Achieved

  1. Critically analyse development problems and determine appropriate methodologies, tools and techniques to solve them

Ssd Unit 4

7 minute read

Published:

Unit 4

Ssd Unit 9

5 minute read

Published:

Unit 9

Ssd Unit 7

5 minute read

Published:

Unit 7

Ssd Unit 3

3 minute read

Published:

Unit 3

Ssd Unit 5

6 minute read

Published:

Unit 5

Ssd Unit 2

9 minute read

Published:

Unit 2

Ssd Unit 6

8 minute read

Published:

Learning Outcomes Achieved

  1. Critically analyse development problems and determine appropriate methodologies, tools and techniques to solve them

Ssd Unit 1

7 minute read

Published:

Unit 1

Trends in Information Systems- Blockchain Technology

8 minute read

Published:

Introduction

As companies become increasingly digitalized, their risk of security breaches also increases. Many companies are now beginning to prioritize their cybersecurity in an attempt to safeguard their data, and one technology which may assist these companies is blockchain. Blockchain is an emerging technology which enhances the way we interact with data, due to its transparent and secure nature. It relies on a decentralized network of devices containing an identical record of transactions or data (PwC, 2021), which adds data to the network based on consensus, trust, and computationally intensive algorithms, making it effectively impossible to create a fraudulent transaction, revert the state of the data, or harm data integrity.

Launching into Computer Science- Unit 12

3 minute read

Published:

Unit 12

Despite the challenges, unit 12 was my favorite of all. The end-of-module assignment was an introduction to the world of academic writing and helped me to learn a new way of thinking. Having never done it before, there was a period of adjustment. I started the assignment very early, but made the mistake of writing first, before fully exploring the theme I selected and the related niches. I found that academic research is extremely detailed in nature, and not spending enough time learning the various niches and terminologies, makes it harder to write a paper. I initially found papers relevant to my topic and used them as the basis of my essay, however, after I continued to read and study all the related academic literature, I realized that I would have to start my paper again from scratch, because the inital frameworks were not fully appropriate for the case study I selected; they were too vague and did not make it possible to clearly identify areas for improvement. In light of this, I decided to change my strategy and focused on reading the content of entire papers with the aim of building a “mental model” of the topic, and connecting niche subtopics to that main topic. This helped me to determine what terminology to use when looking for papers, and also helped a lot in making my logic clear and easy to understand, regardless of whether the reader has experience in the area of research or not.

Launching into Computer Science- Unit 4

1 minute read

Published:

Unit 4

The aim of this task was to discover the process of loading a webpage. Based on experience with bad internet connections, I’ve always thought the process was loading HTML first, then CSS, then Javascript. If a connection I’ve used was slow or unstable, what would usually happen is that the HTML would load, but be completely unstyled. Sometimes it would only be partially styled. After that, CSS would load, and then Javascript- I would be able to tell if Javascript loaded because webpage elements (e.g. text in expandable sections) would start being hidden. This is somewhat correct; according to Kantor (2021), there are two phases to loading a webpage. The first is where the HTML is fully parsed and loaded, but resources not present in the HTML are yet to be loaded. This would include things such as CSS/JS files and images. Finally, in the second phase, these files are loaded and rendered. Typically, the browser will make requests to retreive and render this data. This can be shown by using a Chromium-based browser and pressing CTRL+SHIFT+I, then opening the Network tab and loading a webpage. All the data required to render a webpage fully is shown on the right. A screenshot is shown below:

Launching into Computer Science- Units 5 & 6

6 minute read

Published:

Units 5 & 6

I originally began working on the units’ content separately, but as I continued, I realized my approach to the content created a lot of overlap between the units’ activities; for this reason, I decided to merge their content.

Launching into Computer Science- Units 10 & 11

2 minute read

Published:

Units 10 & 11

SQL is quite nice to work with as a language because of how close it is to natural English. This thought prompted me to read more about the theory behind it to better understand why it’s so effective, and this led me to discover the concept of declarative programming. Declarative programming is a form of programming that is built around the concept of a developer merely expressing their intentions code, while any complex logic involved in achieving that intention is left to the computer. A good example of this is the use of the WHERE clause in SQL. Rather than write loops with conditionals which would allow you to select specific entries, you would simply write WHERE, and SQL would decide how to approach this request by creating a query plan (a query plan can be thought of as the lower level instructions generated to execute a given query).

Explaining Backpropagation

6 minute read

Published:

This blog post aims to clear up backpropagation in neural networks and give a more intuitive understanding of how it works. Before starting, recall that the goal of a neural network is to learn the weights $W$ and biases $b$ that minimize some loss function $L$.

portfolio

publications

talks

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.