Sabit Esati | Cyber Security & IT Portfolio

My Cyber security Portfolio

Research Articles

These articles form a structured research portfolio examining the intersection of human behaviour, system design, governance, and emerging threats in cyber security. The purpose is to move beyond purely technical analysis and explore the broader factors that shape security outcomes in modern organisations.

Topic 1 – Human Factors

  1. Human Error as the Primary Attack Vector in Modern Cyber Security
  2. Why Security Policies Fail: A Behavioural Analysis
  3. Convenience vs Security: The Psychological Trade-Off
  4. Overconfidence Bias and Its Impact on Organisational Security
  5. The Role of Ethical Leadership in Cyber Security Culture

Topic 2 – Architecture & Design Research

Topic 3 – IoT & Vulnerability Research

Topic 4 – Threat Intelligence Research

Topic 5 – Risk & Governance Research

Topic 6 – AI & Emerging Threat Landscapes

Topic 7 – Cyber Security & Non-IT Societal Links


Smart Lock Blogs

The following articles were written as part of my professional role within the smart lock and IoT security industry. Drawing on my training in cyber security and practical experience working with access control systems, these blogs apply structured threat modelling and security principles to real-world smart lock deployments.

Threat Modelling Smart Locks: Understanding the Attack Surface of IoT Entry Systems

This article applies structured threat modelling to smart locks, analysing physical and digital attack surfaces, realistic threat actors, and layered security controls. It explains how IoT entry systems manage cyber and physical risk when properly configured and deployed.

https://ausmartlocks.com.au/blogs/news/threat-modelling-smart-locks-iot-entry-security

Smart Lock Security: Why You Don’t Need to Worry

This article explains how smart locks use encrypted Bluetooth communication, controlled access management, and layered security to protect homes. It compares smart lock security to traditional keys and outlines why properly configured IoT entry systems are secure.

https://ausmartlocks.com.au/blogs/news/smart-lock-security-explained

Newsletter sign-up details included.

Stay informed with project updates.