Modules

Induction Computing
Induction Computing

Orientation and foundation skills for the MSc programme

Launching Into Computing

Core concepts and academic skills for computing studies

Advanced Object Oriented Design and Programming

Advanced OOP concepts, patterns, and software design


Network Security
Network Security

Vulnerability Assesment, Security and Compliance management

Security and risk management

Identify, assess, and mitigate digital threats

Recent Posts

DR Solutions Design and Review

Based on Kumar (2024) and Corbari et al. (2024) 1. What are some of the main vendor lock-in issues the authors identify? How would you mitigate them? According to Kumar (2024), vendor lock-in manifests primarily through Technical and Organizational obstacles. Mitigation Strategies: To mitigate these risks, I would recommend a Multi-Cloud Strategy combined with Containerization … Continue reading DR Solutions Design and Review

Modelling Social Engineering Threats Based on Aijaz, M. and Nazir, M. (2024)

1. What are the main challenges in modelling and evaluating the outcomes of Social Engineering Threats (SETs), and how does this study address them? The primary challenge in modelling SETs is the inherent unpredictability of human behavior, which makes rigorous mathematical evaluation difficult. Unlike technical exploits, SETs rely on psychological manipulation, which is historically hard … Continue reading Modelling Social Engineering Threats Based on Aijaz, M. and Nazir, M. (2024)

Monte Carlo Simulation (Python) Based on Fizell (2022)

To understand how to model risks with high variance, I developed a Python script using numpy and pandas to run a Monte Carlo simulation. Instead of relying on a single “average” prediction for future risk exposure (e.g., potential financial loss), the simulation generated 1,000 random iterations based on historical volatility. Description: This script simulates 1,000 … Continue reading Monte Carlo Simulation (Python) Based on Fizell (2022)

More Posts