Cybersecurity
A collection of cybersecurity projects, research, and technical writeups. Here you'll find practical insights from SIEM engineering, threat hunting, and hands-on security projects.
Each project/writeup tries to simulate real-world experience and lessons learned in the field.
Security System Evaluation and Remediation
As the chief information security officer (CISO) of Fielder Medical Center (FMC), I have been tasked to review a security assessment report provided by an external consulting firm.
The report identifies potential compliance issues requiring the system security plan (SSP) to be updated, including some security controls in place or planned for system requirements. This assessment is because FMC wants to improve its data management with its digitization goals. The data being stored is sensitive and may contain personally identifiable information. As FMC’s CISO, I will be responsible for identifying and developing a strategy to address the risks identified in the attached “Security Assessment Report for Fielder Medical Center” provided by the external consulting firm. This paper will outline the confirmation or rejection of the findings by evaluating the focus points of the security assessment report, and will also develop a remediation plan for compliance based on the NIST SP-800-53 revision 5.
Cloud Security
As the cloud security engineer at SWBTL LLC, I have been tasked with addressing the security concerns and lack of documentation left behind by a disgruntled employee.
SWBTL LLC contracts with the government and processes card payments daily. So it must comply with certain regulations such as the Federal Information Security Modernization Act (FISMA) and the Payment Card Industry Data Security Standard (PCI DSS). With the upcoming NIST SP 800-53 assessment, it's critical to secure the organization's security posture. Upon assessing and verifying the current vulnerabilities, I will recommend and implement configuration changes that align with business requirements and comply with regulatory guidelines to ensure adherence. This paper will give the company an overview of its current cloud environment and recommendations and mitigations to improve the security posture of the organization.
Penetration Testing Report
As an information security analyst at Pruhart Tech, I have been tasked to ensure that the testing plan aligns with the security controls within the information environment of Western View Hospital.
We will be utilizing Pruhart Tech's information security penetration testing method with the cooperation of Western View Hospital's IT staff to coordinate a safe and complete test within the approved scope. There will be two testing phases: internal assets and external assets. Western View Hospital has made clear the extent of testing that should be done, and the focus will be on the network level and social engineering. This paper will give an analysis of the penetration testing plan, in addition to any recommendations and solutions.