Reflection
There were two courses that aided my ability to learn Python. Those were CYSE250 and CS463. CYSE250 “Basic Programming and Networking” went over the fundamentals surrounding coding in Python. In this course, we used Pycharm to do our assignments. Assignments would go over functions, lists, loops, strings, and other useful things that you need to know to code in Python.
CS463 “Cryptography in Cybersecurity” taught me useful information when it comes to encryption. The course had a final coding project where you had to code a program related to cryptography. I used Python to create a program that would encrypt and decrypt a message. I used RSA encryption and a Caesar cipher within the project. This project was much harder than anything from CYSE250. It required me to learn more than just the basics of Python.
This was one of the final assignments in the programming course where we had to create a server and a client. Once, creating them we had to allow them to communicate with each other. This assignment used the fundamentals that I gathered throughout the course. It also introduced me to sockets and how to set them up.
This is my coding project for the cryptography course. This assignment required me to use things I learned from both the programming course and the cryptography course. If I hadn’t learned the basics from the programming course I wouldn’t have been able to do the coding project. The things I learned about encryption from the cryptography course allowed me to create this project.
During my major, a lot of the courses I took required me to understand or use Linux. Linux was often used in my labs in digital forensics and ethical hacking courses. This introduced me to different tools and applications within Linux. I took a Linux System for Cybersecurity course which taught me the fundamentals. Topics that were touched on were: User and Group Accounts, File and Data Storage, Local Storage: Essentials, Automation, System Administration, and Security Tasks. Overall, these courses gave me an understanding of Linux system administration.
One of the things I learned from my Linux course was password cracking. In this assignment, we used John the Ripper to crack passwords for accounts we created. We used a wordlist file that had thousands of common passwords to see if it would get cracked. This assignment also required us to understand hash functions and the role they play when it comes to securing passwords.
During my major one of the most pressed upon topics was the ethics behind cybersecurity. Looking at recent breaches to understand how they occurred. What steps could have been taken to prevent each breach. If it was a result of poor polices and administration. Looking into the potential ethical impact it may have had socially.
I have had to write numerous papers on ethics and how they play into cybersecurity. This was done to ensure that I understood the ethical implications behind my actions. This ensures that going forward I know what is right and wrong. Potentially, giving me the knowledge to prevent or see how applications could be used for malicious acts. Understand policies and why they are set so I can enforce or maintain compliance with them.
During my Cybersecurity Ethics course, I had to write numbers papers. For each paper I would have to apply a different ethical view or ethical tool: Consequentialism/Utilitarianism, Deontology/Kantianism, Contractarianism, Virtue Ethics, Confucianism, Ubuntu. In this paper, I used the ethical tool of Contractarianism to analyze professional ethics. Essentially, looking at how social contracts are created between companies and the individual/customer. Highlighting the impact social contracts have on the relationship. This plays a role in what is expected from companies and how they handle their responsibility to society.
This assignment analyzes the National Cybersecurity Strategy of the United States. Going over the importance and the reasons it was implemented in the United States. This strategy brings forth new policies that will impact how the U.S. will handle cybersecurity. Creating an environment were cybersecurity is an important factor in deterring potential threats.
This assignment analyzes the ethical implications that come with introducing new policies. Analyzing the potential negative side effects that could come with the National Cybersecurity Strategy of the United States. This paper considered the policies and the impact they could have on businesses/individuals.
Throughout my academic career, there have been a lot of topics covered. This has allowed me to understand the importance of cybersecurity within society. It has also taught me fundamental skills that I can use in the future.
Working in asset protection has also given me experience with physical security. I was also responsible for educating the employees about scams and other safety concerns. This could range from physical scams to cybersecurity-related scams. This role also required me to write detailed reports and analyze metadata to create response plans for the future.