Nessus
Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.
Years of post-secondary degree
Certified ethical hacker
Ethical hacking
Active participant in cybersecurity forums like Hack the Box, TryHackMe , CyberDefenders , LetsDefend .
Nessus
OpenVAS
Extrahop
Trend Micro XDR
Splunk
Burp Suite
Nmap
Wireshark
Metasploit
Continuous Facial Authentication Using Fuzzy System
• The emergence of continuous facial authentication using fuzzy logic points to success in protecting user data in the driver environment.
• This new approach transforms user authentication by integrating facial recognition into log-in, log-in and log-out processes.
• When users create an account, their facial profile is carefully recorded and associated with DriveSpace, providing ongoing verification throughout
• The system not only identifies the user, but is also vigilant, immediately cutting off the connection when it detects illegal or inappropriate behavior
passionate photographer and editor