Prosper Career & Independent Study

Quote:

"Success is not a destination, it is a journey." 

- Bharat Ane Nenu 


Email: puranjayprashanth@gmail.com

Mission Statement

“I strive for excellence by being as productive as possible, limiting procrastination, and maintaining kindness and respect for others throughout my journey. Making the most out of every day, pushing more and more towards my goals and dreams. I must put great effort into pushing for things I want to accomplish. Without work, there is no success.”

Career Forecast

After concluding my research, I identified that cybersecurity plays a crucial role in securing embedded systems within the field of Electrical and Computer Engineering (ECE). Embedded systems, commonly found in industrial applications, IoT devices, and critical infrastructure, require both hardware and software-based security measures to prevent vulnerabilities and cyber threats.

Hardware-based cybersecurity focuses on securing embedded devices at the physical level, including microcontrollers, FPGAs, and processors. Techniques such as secure boot, hardware encryption modules, and physically unclonable functions (PUFs) help protect against hardware-based attacks, including side-channel attacks and tampering.

On the software side, embedded systems rely on secure firmware, encrypted communication protocols, and intrusion detection mechanisms to safeguard against cyber threats. Operating systems such as embedded Linux and real-time operating systems (RTOS) often incorporate cybersecurity features like secure firmware updates, access control mechanisms, and cryptographic libraries. Kali Linux, a widely used penetration testing OS, offers tools for ethical hacking and cybersecurity analysis, making it valuable for assessing the security of embedded systems.

By implementing both hardware and software-based cybersecurity strategies, engineers can enhance the security and resilience of embedded systems in industrial and consumer applications, ensuring protection against potential cyber threats and attacks.

Resume

Puranjay Prashanth Resume (1).pdf

Interviews

PCIS 1st Interview Assessment.pdf
Copy of PURANJAY PRASHANTH - Interview Assessment (1).pdf
Copy of PURANJAY PRASHANTH - Interview Assessment (2).pdf
PURANJAY PRASHANTH - Interview Assessment (3).pdf

Evidence of Learning (EOL)

Copy of PURANJAY PRASHANTH - Evidence Of Learning Menu-- Tiffany Version .pdf
Copy of PURANJAY PRASHANTH - Evidence of Learning #2.pdf
Copy of PURANJAY PRASHANTH - Evidence of Learning #3.pdf
PURANJAY PRASHANTH - Evidence of Learning #4 (1).pdf
PURANJAY PRASHANTH - Evidence Of Learning Menu-- Tiffany Version .pdf
PURANJAY PRASHANTH - Evidence Of Learning Menu-- Tiffany Version (1).pdf
PURANJAY PRASHANTH - Evidence Of Learning Menu-- Tiffany Version (2).pdf
PURANJAY PRASHANTH - Evidence Of Learning Menu-- Tiffany Version (3).pdf