School Papers
Throughout my undergraduate studies and graduate studies at Athens State University, I had writing assignments for various classes. Please note that some of these are definitely less “fully developed” in nature, but they do illustrate my progression to the point where I am today, as well as illustrate some of my focus areas throughout the years.
The email address on these papers is my school email - please do not attempt to reach me at this email address. Please use levi@seibertsecurity.com or contact me on LinkedIn or X.
Ethics
- Autonomous Ethics - A discussion on the ethical considerations behind self-driving vehicles
- Hacking Hats - An analysis of grey hat hacking from ethical, moral, and legal perspectives
- Illegal Espionage - An analysis of government surveillance methods and their legality (specifically in regard to the 4th Amendment)
Computer Science
- Go To Statement Considered Harmful - An analysis of Edsger W. Dijkstra’s article “Go To Statement Considered Harmful”
- Karnaugh Maps - An elementary overview of Karnaugh Maps and how they are used
Cryptography
- Data Encryption Standard - An overview of the DES encryption algorithm
- Hashing Algorithms - A discussion on various algorithms used for hashing
- Monoalphabetic and Polyalphabetic Ciphers - A discussion on various ciphers used in encryption
- Number Theory and Cryptography - An overview on the importance of number theory in cryptography, an introduction to elliptic curves and their relevance to cryptography, and a quick overview of some lecture notes
- Random Numbers and Cryptography - An overview of the significance and theory of random numbers and their relevance to cryptography
- Securing Cyberspace - A broad overview of “cyberspace” and the role cryptography plays in keeping it safe
- The Evolution of Encryption - An overview and analysis of three of the most common encryption algorithms in modern history: DES, AES, and RSA
- The Quest for Capable Cryptography - An analysis of Horst Feistel’s groundwork for the art of encryption
- The Usability of Bitcoin’s Cryptography - A deep-dive in Bitcoin and the cryptography behind it
- Vigenère and One-Time Pad Ciphers - A discussion on Vigenère/Running Key and One-Time Pad ciphers, and their usability and security
Cybersecurity
- Kali Linux’s Usefulness for Computer Forensics - A discussion on how to utilize Kali Linux’s preinstalled tools for computer forensics
- Covert Channels - A quick overview of the concept of covert channels
- IoT Devices: “Smart” Security Testing - Research in regard to testing the security of internet-connected “smart” devices
- Not So Smart Devices - A discussion on the cybersecurity, or lack thereof, in IoT devices
- The SolarWinds Orion Breach - An analysis of the 2020 SolarWinds cyberattack
- Survey on Hacktivism - A literature review and discussion on the concept of “hacktivism”
- Usable Cybersecurity - A review of a conference paper on the subject of balance cybersecurity and usability