Objective 6-Threat Research and Mitigation

In NTW233 – IoT Architecture, I conducted a complete IoT Device Security Analysis for my final project. This included researching firmware vulnerabilities, analyzing the security posture of mobile companion apps using GoatDroid, reviewing wireless protocol weaknesses, and capturing live packet data using Wireshark. I applied tools like QARK and OSINT techniques to discover risks and document them in a professional report with screenshots and mitigation plans. This project helped me understand how real-world IoT ecosystems are exposed to threats and how layered defenses must be applied across firmware, apps, and networks.

In NTW275 – Network Infrastructure Design I, I completed a technical lab on ARP Inspection and DHCP Snooping. These security features allowed me to detect and prevent ARP spoofing and rogue DHCP servers, both of which are common tactics used in Man-in-the-Middle attacks. I configured Cisco ASA tools and documented how these defenses could maintain network integrity and confidentiality. This experience reinforced how crucial it is to implement prevention strategies at the infrastructure level.

Together, these assignments reflect my ability to evaluate threats, apply appropriate mitigation techniques, and protect sensitive systems across both IoT and enterprise networks.