This repository showcases a hands-on cybersecurity project simulating a real-world security incident in a financial organization. It covers the full security lifecycle, including incident response, evidence collection, offensive testing, secure protocol design, & access control evaluation, aligned with SOC operations & enterprise defense practices.
Investigate and document a simulated security incident in a financial environment
Analyse password-cracking risks and assess organisational impact
Design and evaluate a secure communication protocol
Perform and document web server attack simulations
Critically analyse access control approaches and enterprise security models
🔍 Security Incident Response
Incident reporting and documentation
Password cracking time estimation and analysis
Impact and criticality assessment
Security recommendations and mitigation strategies
🧪 Offensive Security & Attack Simulation
Web server attack documentation
Evidence capture and attack workflow logging
Analysis of attacker behaviour and weaknesses
🧩 Secure Protocol Design
Protocol architecture and workflow design
Security goals definition
Threat and vulnerability analysis
Justification of design decisions
🔐 Access Control Systems
Analysis of access control approaches (e.g. DAC, MAC, RBAC)
Evaluation of strengths and limitations
Review of related academic and industry research
Security Incident Response & Reporting
SOC-style investigation and documentation
Password security analysis
Web application/server attack analysis
Secure protocol and system design
Access control models and enterprise security
Risk assessment and critical analysis
Technical documentation and evidence handling
Linux & Windows environments
Password cracking tools (e.g. Hashcat / John the Ripper)
Web attack tools (e.g. Burp Suite, Nikto, Nmap)
Virtualisation platforms (e.g. VirtualBox / VMware)
Security frameworks and best practices
Screenshots and logbook-based forensic documentation
Incident response lifecycle
Risk and criticality assessment
Secure system and protocol design principles
Defence-in-depth
Least privilege and access control best practices Access control models and enterprise security
Risk assessment and critical analysis
Technical documentation and evidence handling