{"id":14,"date":"2025-11-11T02:21:10","date_gmt":"2025-11-11T02:21:10","guid":{"rendered":"https:\/\/student.wp.odu.edu\/avill004\/?page_id=14"},"modified":"2025-11-11T04:09:09","modified_gmt":"2025-11-11T04:09:09","slug":"artifacts","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/avill004\/artifacts\/","title":{"rendered":"Research and Writing"},"content":{"rendered":"\n<div data-wp-interactive=\"\" class=\"wp-block-file alignright\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Solar-Winds-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Solar-Winds-2.\"><\/object><a id=\"wp-block-file--media-423131d3-2251-4e30-960e-8bc0ab5e498c\" href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Solar-Winds-2.pdf\">Solar-Winds-2<\/a><a href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Solar-Winds-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-423131d3-2251-4e30-960e-8bc0ab5e498c\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-left\"><strong>01: SolarWinds Supply Chain Attack Paper (2024)<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">This in-depth research paper examined the SolarWinds supply chain attack, one of the most damaging cyber incidents in recent history. I analyzed how malicious code was inserted into Orion software updates, the ripple effects across government and private networks, and the larger implications for national security. The project demonstrates my ability to research complex threats, break down technical details into accessible explanations, and evaluate long-term cybersecurity risks. It also highlights my understanding of how vulnerabilities in trusted supply chains can be exploited to undermine critical infrastructure.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file alignleft\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/WA2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WA2-1.\"><\/object><a id=\"wp-block-file--media-2ceab5da-1556-4b71-91d8-4f412fa54628\" href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/WA2-1.pdf\">WA2-1<\/a><a href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/WA2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2ceab5da-1556-4b71-91d8-4f412fa54628\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-right\"><strong>02: Legal Analysis Memorandum (WA2, 2024)<br><\/strong>In this assignment, I wrote a structured memorandum analyzing Fourth Amendment implications in a DEA case involving digital surveillance. The project required me to interpret legal precedents, apply constitutional reasoning to a modern cyber context, and clearly present findings in a professional memo format. This artifact illustrates my ability to bridge technical cybersecurity issues with legal frameworks, an increasingly valuable skill in fields such as digital forensics, law enforcement, and compliance.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file alignright\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Cyber-Threats-to-the-US-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cyber-Threats-to-the-US-1.\"><\/object><a id=\"wp-block-file--media-473de787-d940-4347-94e9-32950c4b8cd6\" href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Cyber-Threats-to-the-US-1.pdf\">Cyber-Threats-to-the-US-1<\/a><a href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Cyber-Threats-to-the-US-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-473de787-d940-4347-94e9-32950c4b8cd6\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-left\"><strong>03. Research Paper: Cyber Threats to the U.S. from China (2025)<\/strong><br>This scholarly essay explored China\u2019s offensive and defensive cyber capabilities, focusing on military, espionage, and economic impacts. I used peer-reviewed sources and government reports to analyze threat vectors and long-term implications for U.S. national security. The artifact demonstrates advanced research and writing skills, mastery of APA citation, and the ability to synthesize large volumes of information into a cohesive and persuasive argument. It also shows my readiness to contribute to policy and strategy discussions around global cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/How-Awareness-Shapes-Online-Risk.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of How-Awareness-Shapes-Online-Risk.\"><\/object><a id=\"wp-block-file--media-d07e18c9-e8e4-4934-8ece-9bcafb475df7\" href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/How-Awareness-Shapes-Online-Risk.pdf\">How-Awareness-Shapes-Online-Risk<\/a><a href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/How-Awareness-Shapes-Online-Risk.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d07e18c9-e8e4-4934-8ece-9bcafb475df7\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>04. How Awareness Shapes Online Risk \u2013 Insights from Nigerian Internet Users (2025)<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">This artifact is a detailed article review of Emerging Trends in Cybercrime Awareness in Nigeria by Nzeakor et al. (2022). The study surveyed over 1,100 internet users in Umuahia, Nigeria to explore how awareness of different cybercrimes, such as fraud, identity theft, hacking, and cyberterrorism, relates to victimization. My review highlighted surprising findings, including that higher awareness sometimes correlated with increased risk of being a victim.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file alignright\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/IDS-Term-Paper-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of IDS-Term-Paper-1.\"><\/object><a id=\"wp-block-file--media-cbab91b5-09db-4da9-aad2-79a9ab828fb8\" href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/IDS-Term-Paper-1.pdf\">IDS-Term-Paper-1<\/a><a href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/IDS-Term-Paper-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cbab91b5-09db-4da9-aad2-79a9ab828fb8\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-left\"><strong>05. Interdisciplinary Paper on Social Media &amp; Mental Health (2025)<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">This interdisciplinary essay examined the relationship between adolescent mental health and social media use through the lenses of psychology, education, neuroscience, and ethics. By proposing digital literacy programs as a solution, I demonstrated the ability to integrate research across multiple fields and propose practical interventions. While not strictly a cybersecurity project, this paper illustrates my versatility as a researcher and my ability to connect cybersecurity themes (such as online safety and digital responsibility) with broader social challenges.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file alignleft\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Midterm-425W-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Midterm-425W-1.\"><\/object><a id=\"wp-block-file--media-4c7310b4-54fc-44b8-8ab4-6dd65d8ab6b1\" href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Midterm-425W-1.pdf\">Midterm-425W-1<\/a><a href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Midterm-425W-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4c7310b4-54fc-44b8-8ab4-6dd65d8ab6b1\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-right\"><strong>06. National Cybersecurity Strategy Review: Focusing on Defending Critical Infrastructure (2025)<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-right\"><br>This research paper provides an analytical review of the 2023 <em>National Cybersecurity Strategy<\/em> issued by the Biden Administration, with a particular focus on the first strategic pillar\u2014defending critical infrastructure. I examined how the strategy shifts responsibility for cybersecurity from individuals to organizations with greater resources and technical capacity, emphasizing shared responsibility, accountability for software producers, and stronger federal-private collaboration. The paper evaluates how this approach supports national security by safeguarding sectors like energy, transportation, and healthcare. Through the discussion of real-world examples such as the Colonial Pipeline ransomware attack, the project demonstrates my ability to link policy with practice and to analyze cybersecurity through legal, strategic, and technical lenses. This artifact highlights my skills in critical analysis, policy interpretation, and written communication\u2014key components of cyber policy and governance.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Safeguarding-the-Future-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Safeguarding-the-Future-1.\"><\/object><a id=\"wp-block-file--media-5a183271-d9a5-47bf-9d87-25e838bad3c1\" href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Safeguarding-the-Future-1.pdf\">Safeguarding-the-Future-1<\/a><a href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Safeguarding-the-Future-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5a183271-d9a5-47bf-9d87-25e838bad3c1\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>07. Safeguarding the Future (2025)<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>This essay integrates key cybersecurity principles and frameworks, such as the <strong>CIA Triad<\/strong>, <strong>SCADA systems<\/strong>, and the <strong>NIST Cybersecurity Framework (CSF)<\/strong>, to propose strategies for protecting future digital infrastructures. It begins with a discussion on evolving technologies like artificial intelligence and quantum computing and their potential to outpace traditional security methods. The essay stresses the importance of proactive measures including incident response planning, employee training, and government regulation. I analyzed how concepts like confidentiality, integrity, and availability guide data protection, how SCADA systems can both strengthen and endanger critical infrastructure, and how the NIST framework provides a practical roadmap for risk management and recovery. This artifact showcases my ability to synthesize technical and ethical concepts, apply theoretical frameworks to real-world systems, and communicate complex ideas clearly to diverse audiences.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file alignleft\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Final-407-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Final-407-1.\"><\/object><a id=\"wp-block-file--media-49104d0d-0e3f-4ca1-8091-00a741e2c00d\" href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Final-407-1.pdf\">Final-407-1<\/a><a href=\"https:\/\/student.wp.odu.edu\/avill004\/wp-content\/uploads\/sites\/38110\/2025\/11\/Final-407-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-49104d0d-0e3f-4ca1-8091-00a741e2c00d\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-right\"><strong>08. Digital Forensics Case Report: DF-2025-0417 (2025)<\/strong><br><br>This professional forensic report documents my investigation into a suspected data exfiltration case involving a high-ranking U.S. official. As the assigned Certified Digital Forensic Examiner, I conducted physical and logical acquisition of both an Apple iPhone 13 Pro and a Dell Latitude 7430 laptop using industry-standard tools such as FTK Imager, Autopsy, and EnCase.<br>My work included data hashing for integrity verification, recovery of deleted files, keyword analysis, timeline reconstruction, and cross-device log correlation. Findings revealed encrypted file transfers, deleted browser history, and suspicious correspondence with a foreign contact. The report concludes with documented evidence of intentional obfuscation and potential unauthorized disclosure of classified material. This artifact demonstrates advanced technical competencies in digital forensics, evidence handling, data integrity validation, and analytical reporting\u2014skills essential for investigative cybersecurity roles in law enforcement and national security contexts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>01: SolarWinds Supply Chain Attack Paper (2024) This in-depth research paper examined the SolarWinds supply chain attack, one of the most damaging cyber incidents in recent history. I analyzed how malicious code was inserted into Orion software updates, the ripple effects across government and private networks, and the larger implications for national security. The project&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/student.wp.odu.edu\/avill004\/artifacts\/\">Read More<\/a><\/div>\n","protected":false},"author":30335,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/avill004\/wp-json\/wp\/v2\/pages\/14"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/avill004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/avill004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/avill004\/wp-json\/wp\/v2\/users\/30335"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/avill004\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/avill004\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":74,"href":"https:\/\/student.wp.odu.edu\/avill004\/wp-json\/wp\/v2\/pages\/14\/revisions\/74"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/avill004\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}