Information Assurance Portfolio
Hello, my name is Justin Wasser. This page is dedicated to honing my technical skills and exploring topics in information assurance. Please take a look at some of my work!
I created a ticket purchasing system, which included performing a requirements analysis, creating dataflow diagrams, and designing UIs and database structures.
I walked through a series of essential Active Directory tasks.
I performed a vulnerability scan of a LAN using Nessus.
Configuring a custom firewall rule using Windows Defender.
Analyzing common causes of buffer overflow and SQL injection vulnerabilities and how attackers exploit them.
Conducting a comprehensive risk assessment using NIST SP 800-30.
Using Wireshark to capture and analyze network traffic.
Resolving a security issue using SQL.
Writing a detection rule.
Using Python to parse files, restrict content permissions, and remove access rights.
Using Splunk to investigate possible security issues with a company’s mail server.
Using EnCase to investigate and document a case involving potential industrial espionage.
Running an instance of Nessus in Docker.
A partner and I created/exchanged keys, and encrypted/exchanged/decrypted messages.
Using Linux commands to review and alter authorizations for files and directories.
The hard drive of a virtual machine was explored using the forensic tool FTK Imager.
Assessing an organization's security controls and their regulatory compliance.
Creating a risk register based on the operational environment of a company.
The suitability of model-based security testing for IoT device penetration testing.
How I would approach certifying a Crypto module with government ATO - A&A, and EAL 7 certifications.
Exploring how DL can be leveraged to better protect IoT networks.
Investigating how blockchain technology is well-suited for documenting evidence gathered from wearable IoT devices.
Conducting a cost-benefit analysis of anomaly and signature-based detection methods and determining which methodology is optimal in a given network environment.
Breaking down the CMMI Framework and its constellations (DEV, ACQ, SRV).
Current state-of-the-art Radio Access Network (RAN) bandwidth capabilities/limitations, and its impact on cloud computing architecture.
Discussion on how the IoE produces better insights at the cost of heightened security risks.
Investigating whether an individual can be legally required to unlock a smartphone by law enforcement and the ramifications if access can be compelled.
Exploring the unique designation of personal devices from a legal perspective, and why they require heightened 4th amendment protections against warrantless searches.
I developed an implementation schedule for the ticket purchasing system I designed.
The skills a PM should possess and how they support different phases of an IT project’s lifecycle.
Conducting a literature review of prominent philosophies and methodologies for analyzing and resolving conflicts between stakeholders.
PowerPoint presentation on how various IT PM topics relate to a project’s overall success.
Email: justinwasser1@gmail.com
LinkedIn: View My Profile