Stephen Fong
Learner -
(2)
6
Portals

Skills

Application programming interface (api) 2 Collaboration 2 Cyber security 2 Cyber security management 2 Database analysis 2 Database design 2 Database schema 2 Data extraction 2 Data integrity 2 Ethical standards and conduct 2 Mysql 2 Presentations 2 Report writing 2 Rest api development 2 Restful api 2 Scalability 2 Security testing 2 Student engagement 2 Vulnerability 2 Vulnerability management 2

Achievements

Latest feedback

Recent projects

PatchIT Solutions Inc
PatchIT Solutions Inc
Canada

Cybersecurity Data Collection Research Assistant

The main objective of the project, focusing on cybersecurity data collection and labeling for vulnerability management, is to enhance the understanding and management of cybersecurity vulnerabilities. This project aims to engage students in the crucial task of gathering, analyzing, and labeling data related to cybersecurity threats and vulnerabilities. Problem to Solve: Students will be tasked with addressing the challenge of identifying and categorizing various types of cybersecurity vulnerabilities. This involves the collection of vast amounts of data from different sources, such as security logs, network traffic, and public vulnerability databases. The key challenge lies in accurately analyzing and interpreting this data to identify potential vulnerabilities. Expected Outcome: By the end of the project, students are expected to achieve the following outcomes: 1. Comprehensive Data Collection: Students should be able to gather relevant cybersecurity data from multiple sources systematically. This includes understanding where to find data and how to extract it efficiently. 2. Effective Data Labeling and Categorization: Students should develop skills to accurately label and categorize the collected data based on the type and severity of the vulnerabilities. This involves understanding different types of cybersecurity threats and their characteristics. 3. Vulnerability Analysis Skills: Students should be able to analyze the labeled data to identify patterns or trends that could indicate potential security vulnerabilities or breaches. 4. Reporting and Documentation: Students should be able to document their findings in a clear and concise manner, providing insights and recommendations for vulnerability management and mitigation strategies. 5. Awareness of Ethical and Legal Considerations: Students should understand and adhere to ethical and legal standards in data handling, particularly regarding sensitive or personal information. 6. Collaborative Skills: Given the complexity of cybersecurity, students should also learn to collaborate effectively, sharing insights and combining expertise to tackle multifaceted problems. The success of this project lies in its ability to equip students with practical skills in handling real-world cybersecurity challenges, enhancing their ability to identify, analyze, and manage cybersecurity vulnerabilities in various environments.

Matches 5
Category Education + 1
Closed
BoardSpace
BoardSpace
Ottawa, Ontario, Canada

Secure Database Redesign and RESTful API Development for BoardSpace

BoardSpace, a company specializing in web applications, seeks to enhance the security and efficiency of its existing mySQL database. The current database structure needs a comprehensive redesign to improve performance, scalability, and security. Additionally, a secure RESTful API must be developed to facilitate seamless interaction between the database and the web application. This project aims to provide learners with hands-on experience in database design, security best practices, and API development. The goal is to create a robust, secure, and efficient system that can handle the company's data needs while ensuring data integrity and protection. Key tasks include: - Analyzing the current mySQL database structure. - Designing a new, optimized database schema. - Developing a RESTful API to interact with the redesigned database. - Implementing security measures to protect data. - Testing the new database and API for performance and security.

Matches 1
Category Databases
Closed