My Projects

Here are some of the projects I've worked on, showcasing my skills in software engineering and cyber security.

Computer Security Coursework 2

Computer Security Coursework 2

This second coursework for the COM2041 module is focused primarily on security protocols, including the assessment of vulnerabilities to man-in-the-middle attacks by potential attackers, such as Alice and Bob. It encompasses methods for hashing, encryption, and the application of MAC (Message Authentication Code) addresses to safeguard data during transmission between users utilizing the Scyther software.

Computer Security Coursework 1

Computer Security Coursework 1

This coursework for the COM2041 module is concentrated primarily on the practical applications of cryptography, including advanced encryption standards like AES, data encryption standards like DES, secure hashing algorithms like SHA, and public-key cryptographic systems like RSA.

Web Application Development Coursework

Web Application Development Coursework

This Django project for the COM2025 module is a website designed for a music distribution platform.

Vendur

Vendur

In the increasingly competitive digital commerce landscape, small to medium-sized businesses (SMBs) face significant challenges in establishing and maintaining a meaningful online retail pres ence. Unlike large retail enterprises, these businesses often lack tools that enable them to manage and optimise an e-commerce platform that can meet ever-evolving customer expectations. Meanwhile, modern consumers demand smooth and fast online shopping experiences, including intuitive product browsing and secure checkout and payment. Failure to meet these standards can often lead to lost sales opportunities and hurts the overall reputation and presence of brands in a highly saturated market. This is further amplified by the operational complexity of providing a technically sound and re sponsive platform that meets these needs. In order to analyse sales trends and respond to customer feedback, many smaller organisations are forced to develop sub-par systems, or rely on platforms such as social media, which are not purpose-built retail solutions. This not only negatively impacts customer experience, but poses a significant security risk as well.

Attribute-Based Authorisation as a  Micro-service with Dynamic Encryption  Selection

Attribute-Based Authorisation as a Micro-service with Dynamic Encryption Selection

This project provides an Attribute-Based Access Control (ABAC) authorisation system designed for low end devices with limited resources. Users can securely share files using a token based sharing scheme, where these tokens include access permissions and an access time frame. The system is implemented using a microservice architecture to ensure lightweight, scalable performance on a large number of hardware levels. The system dynamically selects an encryption profile based on the hardware capabilities of the device, in order to provide more secure algorithms when system resources allow it. More efficient profiles are chosen when the hardware of the systems is capable of processing the requirements efficiently. A web application demo is used to provide the system, featuring an interface that enables file navigation, access, and sharing through QR codes or shareable links. This project highlights how dynamic encryption profiles, combined with ABAC permission tokens, can provide secure and efficient access control even on resource limited systems.

Java For Beginners

Java For Beginners

A list of tasks in Java to learn the core concepts.

Eunoias

Eunoias

To solve the problem of nurturing a healthy workforce, we decided to create a platform for companies to help improve their employees' mental health (via the counsellor) while maintaining professionalism. This app has many features to reach this goal such as mental health assessments, an intervention system in which counsellors can help employees facing challenges, and a leaderboard to promote healthy competition which in turn, helps each user. Managers with admin permissions will also have a dashboard with moderative capabilities. The user will also have a dashboard showing statistics, articles, and challenges.

Surrey CompSoc Web Application

Surrey CompSoc Web Application

As the Web Master for the University Of Surrey Computing Society, I have been tasked with creating a new web application for the society.