Skip to main content
  1. blog/

Cyber

·3 mins· loading · loading ·
P4t0
Author
P4t0
A little bit about you
Table of Contents

An Icon with custom HTML

Wide Page with Large HTML Objects

This page uses a custom wide container instead of Blowfish’s default narrow column. Since no background or fixed colors are set, Blowfish’s dark/light theme styles will automatically apply.

Wide Random Banner Image

Wide Test Table

Column A Column B Column C Column D
Row 1, Cell A Row 1, Cell B Row 1, Cell C Row 1, Cell D
Row 2, Cell A Row 2, Cell B Row 2, Cell C Row 2, Cell D
Merged Cell Spanning All Columns

Code Example


#!/bin/bash
# Wide Sample Bash Script
for i in {1..20}; do
  echo "Count: $i"
  sleep 0.5
done

  

Embedded Video

Long List

  • Item 1 - Long descriptive text goes here
  • Item 2 - Another extended entry with more details
  • Item 3 - Testing multi-line wrapping in lists
  • Item 4 - Even more content to stretch the layout
  • Item 5 - Large list item with additional notes
  • Item 6 - Extra filler item for scrolling tests
  • Item 7 - More wide rendering checks
Funny gif

ffff Controls implemented using technology. - Examples: Firewalls, antivirus software, system policies within operating systems.

  • Managerial:

    • Policies and procedures for managing security.
    • Examples: Security policy documentation, onboarding policies, compliance procedures.
  • Operational:

    • Controls relying on human interaction and processes.
    • Examples: Security guards, awareness training, reception desks.
  • Physical:

    • Measures restricting physical access.
    • Examples: Guard shacks, badge readers, fences, locks.

Control Types
#

alt text

  • Preventive:

    • Stops events from happening.
    • Examples:
      • Technical: Firewall rules.
      • Managerial: Onboarding policies.
      • Operational: Guard shack ID checks.
      • Physical: Door locks.
  • Deterrent:

    • Discourages malicious activity.
    • Examples:
      • Technical: Security splash screens.
      • Managerial: Threat of demotion for violations.
      • Operational: Reception desk monitoring.
      • Physical: Warning signs.
  • Detective:

    • Identifies and warns about events.
    • Examples:
      • Technical: System logs and login reports.
      • Managerial: Log review policies.
      • Operational: Patrolling security guards.
      • Physical: Motion detectors.
  • Corrective:

    • Responds to and mitigates damage from incidents.
    • Examples:
      • Technical: System backups and restorations.
      • Managerial: Policies for issue reporting.
      • Operational: Contacting authorities.
      • Physical: Fire extinguishers.
  • Compensating:

    • Provides temporary or alternative solutions when primary controls fail.
    • Examples:
      • Technical: Firewall rules instead of software patches.
      • Managerial: Separation of duties.
      • Operational: Multiple security guards working concurrently.
      • Physical: Power generators for outages.
  • Directive:

    • Provides guidance or instructions for secure practices.
    • Examples:
      • Technical: File storage policies for sensitive data.
      • Managerial: Compliance and procedural documentation.
      • Operational: Security training courses.
      • Physical: Signs stating “authorized personnel only.
  1. Senior Machine Learning Engineer

    Jun 2022 – Present

    Analysing sidescan sonar data and GAN based image simulation

    - Project managed and mentored 2 interns for an **augmented reality** mission planning tool. - Developed a **custom MLflow server** for reproducibility of ML experiments. - Ownership of internal sidescan sonar simulation codebases. - Maintained internal ML dependencies (e.g., **CUDA**).
  2. Machine Learning Engineer

    2020 – 2022

    Sidescan sonar image synthesis with GANs

    - Developed custom **generative adversarial network (GAN)** solutions for sonar image simulation. - Integrated CUDA-accelerated training pipelines.
  3. Education

    2015 – 2019

    B.Sc. in Computer Science

    - Specialized in machine learning and computer vision. - Published undergraduate thesis on **signal processing for sonar imaging**.