Maruf Farhan
MSc in Cybersecurity| Research Assistant & Published Author AI & Threat Intelligence Research Collaborator Comptia Security+ Certified| | Blockchain Fan | Cybersecurity Blogger | Expert Technical Support @ Kaspersky Lab
London, England, United Kingdom
1K followers
500+ connections
About
As a Computer Science Teacher at Engage Education, I teach Computer Science topics such as Python, Algorithms, Cybersecurity and networking topics to students using interactive and inclusive methods. I hold an MSc in Cybersecurity from Northumbria University with Distinction, where I conducted and published cutting-edge research on wireless security and Blockchain in collaboration with Professors and fellow researchers.
I have six years of experience in the IT technical support industry, where I developed and demonstrated strong skills in troubleshooting, problem-solving, communication, and customer service. I have also earned multiple certifications from CompTIA and Kaspersky Lab, showcasing my proficiency and knowledge in various aspects of cybersecurity. I am passionate about learning new tools and technologies, such as Splunk, and applying them to real-world scenarios. My goal is to become a proficient and professional cybersecurity analyst and researcher and to make a positive impact on the cybersecurity field.
Articles by Maruf
-
Understanding SSRF (Server-Side Request Forgery) Through a Practical Example
Understanding SSRF (Server-Side Request Forgery) Through a Practical Example
By Maruf Farhan
-
Understanding IDOR: A Key Vulnerability in Web Security
Understanding IDOR: A Key Vulnerability in Web Security
By Maruf Farhan
-
From Innocent Spreadsheet to Silent Attack: The Dangers of CSV Injection"
From Innocent Spreadsheet to Silent Attack: The Dangers of CSV Injection"
By Maruf Farhan
Contributions
-
Here's how you can stay relevant in your late IT career.
I had a conversation with the college human resources department about updating IT skills the day before yesterday. Like the medical profession, the information technology profession is constantly evolving, and you will need to upgrade both your knowledge and your skills in order to keep up with the changes. It is necessary for you to obtain some fundamental certification, which is completely free of charge, in order to better comprehend the new platform.
-
Here's how you can future-proof your network security for blockchain technology.
Assessing the potential for smart contract vulnerabilities was a key part of risk assessment process for blockchain integration. To mitigate these risks, implementing a mandatory code review process for all smart contracts before deployment is beneficial. This helped identify and fix potential security holes and fostered a culture of security awareness within our development team. While there's always an element of risk, these steps provided a strong foundation for securing the blockchain environment.
-
How can you create a secure network in the age of social engineering attacks?
Whistleblower Programs: Implement programs that allow employees to report suspicious activities anonymously, promoting a security culture. Monitoring and Anomaly Detection: Continuously monitor network traffic for unusual or suspicious behavior. Implement anomaly detection systems to identify potential social engineering attempts.
Experience
Education
-
-
North South University
Bachelor of Business Administration (BBA) Marketing
-
Activities and Societies: Photography club Earth CLub
-
Northumbria University
Master of Science - MS Cybersecurity Distinction
-
MSc in Cybersecurity - Northumbria University (2022-2023) with Distinction
Thesis: Utilizing Blockchain Technology to Detect Fake Products.
Courses: Networking, Information Governance, Wireless Security, Ethical Hacking, Information Risk Management, and Research Methodology.
Licenses & Certifications
-
-
-
-
-
Network Security & Database Vulnerabilities
Coursera
IssuedCredential ID https://www.credly.com/badges/63c14b14-cd01-4a94-9279-b1fc9fc01e93/public_url -
-
-
-
-
-
-
-
-
Courses
-
Literature review
-
-
Quantitative Analysis
-
-
Research Methodology
-
Projects
-
Improving threat intelligence using the power of AI
Research collaboration on Improving threat intelligence using the power of AI
Position: Research Assistant
Supervisor:
Prof. Dr. Usman Butt (Associate Dean and Head of Computing Engineering)
Prof. Dr Abdul Salih (Asst. Professor in cybersecurity/AI, Department of Computer Engineering
Institution: Northumbria University
Duration: 12th December to Continuing (4 Months project) -
Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs
-
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access…
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed framework, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. An Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.
Other creators -
Eavesdropping in Bluetooth Networking
-
This research paper aims to figure out how easy it is to break into Bluetooth networks and listen in on conversations. So, the technical details of this vulnerability will be examined, as well as how cybercriminals use this type of network intrusion, how it influences network security and the hazards that eavesdropping in Bluetooth networks provides to an organization's networks or other sorts of enterprises.
Other creators -
Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs
-
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identi-fiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous au-thentication and trust formation between IoT devices and other entities. To authorize users and enforce access…
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identi-fiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous au-thentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed framework, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. An Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector. CCS CONCEPTS • Security and privacy → Usability in security and privacy.
Other creators
Languages
-
English
Full professional proficiency
-
Bangla
Native or bilingual proficiency
-
German
Elementary proficiency
-
Hindi
Limited working proficiency
Organizations
-
AKIJ Group
HR and Admin Officer, Incharge of Equipment Marketing
- Present
Recommendations received
5 people have recommended Maruf
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More