This is a pygame with music, a custom spaceship, a scoreboard, lives that disappear when hit by an alien, and a play button that I created for a Python class.
This is a link to view my GitHub files and see my original code.
The research paper is about the analysis and reevaluation of ciphers in IoT devices. This link is Collin College recognizing this publication of the abstract.
I completed a project for a class in which I configured my Raspberry PI for a USB rubber ducky on my own home network. In the redirected pdf file link, you can read the my step-by-step instructions on how I did this and see the end result with in which a pre-made payload is used (opens a blank website).
I completed a project for a class in which I configured my Raspberry PI to be used as a Wi-Fi Sniffer and Deauthenicator on my own home network. I ran into some problems in which I had to revert back to a legacy version of Raspberry Pi OS. After, I had problems connecting to WIFI and I used online forums to solve my problems. Through troubleshooting, I was able to finish the project and you can see through the redirected link to view my pdf file on how I did so and screenshots taken on the final outcome.
I completed a project for a class in which I configured my Raspberry PI as a HoneyPi (honeypot) on my own home network. You can see through the redirected link to view my pdf file on how I did so and screenshots taken on the final outcome.
I completed a project for a class in which I installed Kali Linux on my Raspberry Pi 4b on my own home network. I initially started with my Raspberry Pi Zero W and switched over to my 4b after encountering issues. You can see through the redirected link to view my pdf file on how I encountered the problems and troubleshooted them and then see screenshots taken on the final outcome.
This paper is about how computer forensics has evolved over the years, how its rapid growth has played a key role in law enforcement along with the various improvements that it has provided and are still needed.
For my Cybersecurity Defense Operations class, our final was a group presentation of the cumulation of research we had conducted over the semester about our mock financial services company, the various cybersecurity risks that should be considered, and the controls to put in place to mitigate those risks.
In my Information Assurance class, our final paper was about writing a case study about the Equifax Data Breach. My paper discusses how the "Human Factor" played a significant, catastrophic part in how the Apache Struts 2 CVE-2017-5638 vulnerability caused the costly domino effect of events that ensued before, during, and after.
In my Network + class, I had a presentation about the history, the impact, and the future of the Oyster Card's technology that is used for the U.K.'s transportation system as a method of payment.
In my Pentesting class, I had to do a presentation about the 15th chapter, "Footprinting and Social Engineering" for our class book, CEH Certified Ethical Hacker All-in-One Exam Guide. This covered topics such as: Zed Attack Proxy (ZAP), domain dossiers, utilizing HTTP basics, and different social engineering techniques.
In my Virtualization and Cloud Security class, my group of five had to create two presentations. The first was about a company of whom wanted to move from on premise to utilization AWS cloud Services and what their setup was like and what the migration would look like. The second presentation is about what their cloud services and architecture looked like post-implementation.
Copyright © 2024 Melissa Genovese - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.