
Induction Computing
Orientation and foundation skills for the MSc programme

Launching Into Computing
Core concepts and academic skills for computing studies

Orientation and foundation skills for the MSc programme

Core concepts and academic skills for computing studies
Based on Kumar (2024) and Corbari et al. (2024) 1. What are some of the main vendor lock-in issues the authors identify? How would you mitigate them? According to Kumar (2024), vendor lock-in manifests primarily through Technical and Organizational obstacles. Mitigation Strategies: To mitigate these risks, I would recommend a Multi-Cloud Strategy combined with Containerization … Continue reading DR Solutions Design and Review
1. What are the main challenges in modelling and evaluating the outcomes of Social Engineering Threats (SETs), and how does this study address them? The primary challenge in modelling SETs is the inherent unpredictability of human behavior, which makes rigorous mathematical evaluation difficult. Unlike technical exploits, SETs rely on psychological manipulation, which is historically hard … Continue reading Modelling Social Engineering Threats Based on Aijaz, M. and Nazir, M. (2024)
I used Allen Downey’s ThinkBayes2 library to practice Diachronic Bayes, the process of updating a hypothesis ($H$) based on new data (D). Description: This script adapts the ‘Think Bayes’ methodology to a security context. It updates the probability of a specific threat (Hypothesis) being active after observing a specific indicator (Evidence). References:
To understand how to model risks with high variance, I developed a Python script using numpy and pandas to run a Monte Carlo simulation. Instead of relying on a single “average” prediction for future risk exposure (e.g., potential financial loss), the simulation generated 1,000 random iterations based on historical volatility. Description: This script simulates 1,000 … Continue reading Monte Carlo Simulation (Python) Based on Fizell (2022)