© Peter Walker. All rights reserved.
Create a portfolio of your work, outside of lectures, to support your studies.
Using PostgreSQL, create a functioning database for a bank system. This should include functions to perform appropriate tasks, and check authorisation.
Create, and implement (using PostgreSQL), a database for a healthcare provider, that provides full functionality when integrated with a web application.
Research a given list of IoT medical devices, and create a risk assessment given the software versions for any institution using these devices, using ISO 27005:2018.
For a given application, evaluate the security and usability scenarios associated with use, including a risk matrix.
Develop a potential operating system for a vehicular info-tainment system, as a poster. This should build upon common scheduling algorithms and physical memory management.
Describe the process lifecycle of running 'less .bashrc', including in terms of operating system functionality, from initialisation to death.
Perform a full penetration test against the given machine, achieving root access. You should also include detailed explanations for all possible access and PE routes.
Analyse the cyber-attack known as "Stolen Pencil", and other cyber-attacks against university institutions, including recommendations.
Analyse recent stack-based buffer overflow attacks, and the related security of certain systems, including tracing program execution.
Discuss the fundamentals of the 7-layer OSI model for a user who has not been previously exposed to it.
Develop a potential operating system for a vehicular info-tainment system, as a poster. This should build upon common scheduling algorithms and physical memory management.