{"id":246,"date":"2025-12-14T19:11:29","date_gmt":"2025-12-14T19:11:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/amarieport\/?page_id=246"},"modified":"2025-12-15T15:32:19","modified_gmt":"2025-12-15T15:32:19","slug":"keystone-courses","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/amarieport\/keystone-courses\/","title":{"rendered":"CYSE 368"},"content":{"rendered":"\n<p>Cybersecurity Risk Assessment Internship \u2013 City of Suffolk \/ COVA CCI Cybersecurity Clinic<\/p>\n\n\n\n<p>This page primarily describes the work I completed as apart of the Fall 2025, COVA CCI Cybersecurity clinic. As apart of the internship, I worked with the City of Suffolk intending to perform a risk assessment of one of their SQL servers using Tenable and other tools, to accomplish this I worked with two other great individuals in performing this risk assessment to ensure that Suffolk understood the impact of potential vulnerabilities. Due to the complex nature of the task, although we were provided initial team dynamics, we mostly all performed different tasks to ensure that we gained an adequate understanding of exactly what Suffolk wanted us to accomplish. I primarily supported cybersecurity risk assessments by conducting vulnerability scanning, and created dashboards to ensure the risks established by those scans were accurately displayed in a precise manner. This experience strengthened my practical understanding of real-world cybersecurity governance and technical risk management. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Organizational Context <\/h2>\n\n\n\n<ul>\n<li>Municipal government environment<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Focus on public-sector cybersecurity risk and compliance<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Emphasis on CIS compliance, and best practices for local government<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">My role<\/h2>\n\n\n\n<ul>\n<li>Conducting vulnerability scans using Tenable<\/li>\n\n\n\n<li>Designed default dashboards in Tenable<\/li>\n\n\n\n<li>Reviewed SQL server for compliance risks<\/li>\n\n\n\n<li>Analysed scan results, separated by CVSS severity <\/li>\n\n\n\n<li>Mapped overall cybersecurity readiness to Valor Top 10 checklist<\/li>\n\n\n\n<li>Assisted in drafting risk assessment documentation<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Tools &amp; Technologies Used<\/h2>\n\n\n\n<p>Tools and technologies used:<\/p>\n\n\n\n<ul>\n<li>Tenable<\/li>\n\n\n\n<li>Windows Server<\/li>\n\n\n\n<li>NIST CSF<\/li>\n\n\n\n<li>CISA CPG<\/li>\n\n\n\n<li>Valor-Cybersecurity Best Practices<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Skills Developed<\/h2>\n\n\n\n<p>Technical<\/p>\n\n\n\n<ul>\n<li> Vulnerability Analysis<\/li>\n\n\n\n<li>Risk prioritization<\/li>\n\n\n\n<li>Framework Mapping<\/li>\n<\/ul>\n\n\n\n<p>Professional Skills<\/p>\n\n\n\n<ul>\n<li>Technical Writing<\/li>\n\n\n\n<li>Stakeholder and executive communication <\/li>\n\n\n\n<li>Team collaboration <\/li>\n\n\n\n<li>Working in compliance-driven environments<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Reflection &amp; Takeaways<\/h2>\n\n\n\n<p>Below are my reflections &amp; key takeaways:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amarieport\/wp-content\/uploads\/sites\/37074\/2025\/12\/annotated-Reflection20Paper2028229.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Reflection20Paper2028229.\"><\/object><a id=\"wp-block-file--media-7407c26a-92e2-4f10-935d-09a96a02ee78\" href=\"https:\/\/sites.wp.odu.edu\/amarieport\/wp-content\/uploads\/sites\/37074\/2025\/12\/annotated-Reflection20Paper2028229.pdf\">annotated-Reflection20Paper2028229<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amarieport\/wp-content\/uploads\/sites\/37074\/2025\/12\/annotated-Reflection20Paper2028229.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7407c26a-92e2-4f10-935d-09a96a02ee78\">Download<\/a><\/div>\n\n\n\n<p><br><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/amarieport\/wp-content\/uploads\/sites\/37074\/2025\/12\/annotated-Reflection20Paper2022028129.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Reflection20Paper2022028129<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/amarieport\/wp-content\/uploads\/sites\/37074\/2025\/12\/annotated-Reflection20Paper2032028229.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Reflection20Paper2032028229<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/amarieport\/wp-content\/uploads\/sites\/37074\/2025\/12\/Individual-Reflection-5.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Individual-Reflection-5<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><a href=\"https:\/\/drive.google.com\/file\/d\/1LtTag-ISkr-Tuv9otUI2MwK7TJAiVKf9\/view?usp=drivesdk\">https:\/\/drive.google.com\/file\/d\/1LtTag-ISkr-Tuv9otUI2MwK7TJAiVKf9\/view?usp=drivesdk<\/a><\/p>\n\n\n\n<p><br>Overall, this internship was an excellent experience and refined the importance of governance and risk based decision making in cybersecurity, especially in resource-limited or public sector environments. It showcased how frameworks like CIS and the NIST CSF translate from theory to practical application and steered my interest to security assessment and policy focused security engineering. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Risk Assessment Internship \u2013 City of Suffolk \/ COVA CCI Cybersecurity Clinic This page primarily describes the work I completed as apart of the Fall 2025, COVA CCI Cybersecurity clinic. As apart of the internship, I worked with the&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/amarieport\/keystone-courses\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29699,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amarieport\/wp-json\/wp\/v2\/pages\/246"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amarieport\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amarieport\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amarieport\/wp-json\/wp\/v2\/users\/29699"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amarieport\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/amarieport\/wp-json\/wp\/v2\/pages\/246\/revisions"}],"predecessor-version":[{"id":274,"href":"https:\/\/sites.wp.odu.edu\/amarieport\/wp-json\/wp\/v2\/pages\/246\/revisions\/274"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amarieport\/wp-json\/wp\/v2\/media?parent=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}