Peter Walker

© Peter Walker. All rights reserved.


Home
Assessments
Email
Github
LinkedIn

Human Behaviour in Cyber Systems - 2

Create a portfolio of your work, outside of lectures, to support your studies.

🕒 Completed: 28/03/2025

Information Management - 2

Using PostgreSQL, create a functioning database for a bank system. This should include functions to perform appropriate tasks, and check authorisation.

🕒 Completed: 21/03/2025

Information Management - 1

Create, and implement (using PostgreSQL), a database for a healthcare provider, that provides full functionality when integrated with a web application.

🕒 Completed: 21/02/2025

Information Risk and Security Management - 1

Research a given list of IoT medical devices, and create a risk assessment given the software versions for any institution using these devices, using ISO 27005:2018.

🕒 Completed: 10/01/2025

Human Behaviour in Cyber Systems - 1

For a given application, evaluate the security and usability scenarios associated with use, including a risk matrix.

🕒 Completed: 02/12/2024

Operating Systems in a Cyber Context - 1

Develop a potential operating system for a vehicular info-tainment system, as a poster. This should build upon common scheduling algorithms and physical memory management.

🕒 Completed: 05/12/2023

Operating Systems in a Cyber Context - 2

Describe the process lifecycle of running 'less .bashrc', including in terms of operating system functionality, from initialisation to death.

🕒 Completed: 16/05/2024

Cyber Fundamentals - 2

Perform a full penetration test against the given machine, achieving root access. You should also include detailed explanations for all possible access and PE routes.

🕒 Completed: 23/04/2024

Cyber Fundamentals - 1

Analyse the cyber-attack known as "Stolen Pencil", and other cyber-attacks against university institutions, including recommendations.

🕒 Completed: 28/02/2024

Cyber Systems Architecture and Organisation - 1

Analyse recent stack-based buffer overflow attacks, and the related security of certain systems, including tracing program execution.

🕒 Completed: 06/02/2024

Networks, Communications, and Cyber Defence - 2

Discuss the fundamentals of the 7-layer OSI model for a user who has not been previously exposed to it.

🕒 Completed: 13/01/2024

Operating Systems in a Cyber Context - 1

Develop a potential operating system for a vehicular info-tainment system, as a poster. This should build upon common scheduling algorithms and physical memory management.

🕒 Completed: 05/12/2023