I'm deeply passionate about cybersecurity and graduated in the field. I'm fascinated by technology, particularly the advancements AI brings to the cybersecurity realm. Dive into my blog where you can learn something new today!😊 I'm also quite social, so feel free to get in touch with me anytime.
I collaborated with my team to conduct forensic investigations on Android systems, extracting and analyzing digital evidence from devices. Together, we compiled detailed reports documenting findings, methodologies, and conclusions, adhering to industry best practices and legal standards.
Forensic Investigation Results:
- Traces of 'msfconsole' detected, indicating potential compromise.
- Unknown APK allowed on the device, from installing a game MOD.
- Entire mobile compromised.
- Malware removal and system restoration was conducted.
- Detailed documentation of Evidences and System Restoration was Provided.
We designed and implemented an Intrusion Detection System (IDS) utilizing machine learning algorithms, specifically Support Vector Machine (SVM), to detect and thwart cyber attacks effectively. The system was tailored to monitor network traffic, with a particular emphasis on DMZ traffic, and it prioritized the detection of insider threats by identifying malicious activities. Its primary function was to alert administrators promptly upon identifying potential threats, enabling proactive response measures to mitigate risks effectively.
During our collaborative project, we undertook the successful implementation of Visual Cryptography, a cryptographic technique that enhances security by dividing images into shares, making them indecipherable individually but revealing the original image when combined. Alongside this implementation, we developed a user-friendly web interface that served as a proof of concept, showcasing the functionality and effectiveness of our Visual Cryptography solution.
I undertook the implementation of the AES (Advanced Encryption Standard) algorithm from scratch using Python, as part of a personal project. This endeavor aimed to deepen my understanding of cryptography and the mathematical principles underlying the AES algorithm. Subsequently, I integrated this implementation into a chat application, leveraging encryption to enhance the security of communication between users.
This project was specilized in managing the bus system. It was designed to provide a user-friendly interface for bus operators to manage their fleet, routes, and schedules effectively. The system was also tailored to provide passengers with a seamless experience, enabling them to book tickets, track buses in real-time, and receive notifications regarding delays or cancellations. The system was developed using a microservices architecture, ensuring scalability and robustness.
This project was designed to revolutionize the ride-sharing industry by leveraging blockchain technology to enhance security, transparency, and trust between drivers and passengers. The platform was developed to facilitate peer-to-peer transactions, enabling users to share rides securely and efficiently. The implementation of smart contracts and decentralized storage ensured that transactions were tamper-proof and that user data was protected from unauthorized access.