{"id":218,"date":"2023-09-01T15:09:16","date_gmt":"2023-09-01T15:09:16","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-12-05T22:11:15","modified_gmt":"2025-12-05T22:11:15","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/skills-2\/","title":{"rendered":"Top Skills &amp; Supporting Artifacts"},"content":{"rendered":"\n<p>This page highlights my top three marketable skills and the artifacts that demonstrate them. Each artifact is either embedded on this page or linked as a PDF\/website so viewers can explore the full work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Skill 1: Cyber Risk &amp; Compliance<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 430 Final Exam &#8211; Risk Mitigation Strategies<\/h3>\n\n\n\n<p>In this capstone exam essay, I combine risk assessment, business impact analysis, business continuity, disaster recovery, and incident response into a coherent strategy for organizational resilience. This artifact shows my ability to think about risk at a program level and communicate how technical controls support business goals.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/430-Final-Exam-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of 430-Final-Exam-1.\"><\/object><a id=\"wp-block-file--media-18e31c76-d28c-4937-8e02-7b7f68f13658\" href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/430-Final-Exam-1.pdf\">430-Final-Exam-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/430-Final-Exam-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-18e31c76-d28c-4937-8e02-7b7f68f13658\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 430 &#8211; Planning Risk Mitigation Throughout an Organization<\/h3>\n\n\n\n<p>This reflection discuesses risk mitigation across all seven IT infrastructure domains. I connect assets, threats, vulnerabilities, and controls and explain how frameworks like NIST SP 800-53 helped me think about prioritization and cost-benefit decisions.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/Chapter-10-Reflection.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Chapter-10-Reflection.\"><\/object><a id=\"wp-block-file--media-5b397115-a608-4a9e-82e6-299734cb21ba\" href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/Chapter-10-Reflection.pdf\">Chapter-10-Reflection<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/Chapter-10-Reflection.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5b397115-a608-4a9e-82e6-299734cb21ba\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 430 &#8211; Understanding and Maintaining Compliance<\/h3>\n\n\n\n<p>In this reflection, I explore how FISMA, HIPAA, PCI DSS, and the NIST Cybersecurity Framework shape organizational obligations. I also reflect on why compliance alone is not enough and why organizations need ongoing monitoring and a strong security culture.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/Chapter-3-Reflection.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Chapter-3-Reflection.\"><\/object><a id=\"wp-block-file--media-44943c94-f829-4262-a24b-2cabe9db36de\" href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/Chapter-3-Reflection.pdf\">Chapter-3-Reflection<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/Chapter-3-Reflection.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-44943c94-f829-4262-a24b-2cabe9db36de\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Skill 2: Critical Thinking &amp; Problem Solving<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Innovate Cyber 2024 &#8211; EncryptX Prototype Website<\/h3>\n\n\n\n<p>My team built a prototype website to address secure communication challenges while keeping the interface simple enough for real users. I helped identify core user problems, narrow down features, and test assumptions, showing my ability to break complex challenges into manageable design decisions.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/knick004.wixsite.com\/encryptx\">Visit EncryptX Prototype<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Innovate Cyber 2025 &#8211; Internet  Explorers Prototype Website<\/h3>\n\n\n\n<p>Building on lessons from 2024, we improved our design by mapping prior failure points, ranking changes by impact and effort, and refining navigation and flow. This artifact demonstrates iterative problemsolving and user-centered thinking.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/knick004.wixsite.com\/internet-explorers\">Visit Internet Explorers Prototype<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Innovate U-OVN K\u201312 AI Assistant Pitch Canvas<\/h3>\n\n\n\n<p>This pitch canvas outlines a concept for an AI classroom assistant, focusing on equity, accessibility, classroom realities, and privacy. It shows how I use structured frameworks\u2014problem statements, assumptions, tests, and success criteria\u2014to move from an idea to a testable solution.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/U-OVN-pitch-canvas-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of U-OVN-pitch-canvas-1.\"><\/object><a id=\"wp-block-file--media-ee6a6258-d8ef-4603-a21e-d7fcc3af27f7\" href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/U-OVN-pitch-canvas-1.pdf\">U-OVN-pitch-canvas-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/U-OVN-pitch-canvas-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ee6a6258-d8ef-4603-a21e-d7fcc3af27f7\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Skill 3: Research &amp; Cyber Policy Analysis <\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">CISA: A Policy Analysis Review<\/h3>\n\n\n\n<p>This paper explains the Cybersecurity Information Sharing Act (CISA) in accessible language, examines its context, and connects the law to broader U.S. cybersecurity strategy. It demonstrates my ability to synthesize scholarly research, legislation, and policy debates.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-1-Final-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of 425W-Paper-1-Final-1.\"><\/object><a id=\"wp-block-file--media-4dad61d2-e24d-4399-a97a-2deaa610f716\" href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-1-Final-1.pdf\">425W-Paper-1-Final-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-1-Final-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4dad61d2-e24d-4399-a97a-2deaa610f716\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Ethical Implications of CISA<\/h3>\n\n\n\n<p>Here I evaluate CISA through an ethical lens, considering who benefits, who might be put at risk, and how the law affects the balance between national security and privacy. I draw on ethics and political science concepts alongside cybersecurity concerns.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-3-Final.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of 425W-Paper-3-Final.\"><\/object><a id=\"wp-block-file--media-991fdc8d-1bf9-4d99-a083-34703593e70a\" href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-3-Final.pdf\">425W-Paper-3-Final<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-3-Final.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-991fdc8d-1bf9-4d99-a083-34703593e70a\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Social Implications of CISA<\/h3>\n\n\n\n<p>This paper discusses how CISA influences public trust, organizational behavior, and social attitudes toward data sharing and surveillance. It shows my ability to think beyond technical details and analyze the wider social impact of cybersecurity laws.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-4-Final.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of 425W-Paper-4-Final.\"><\/object><a id=\"wp-block-file--media-d12534dd-1b1c-4683-9b0b-2c47fe8b629d\" href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-4-Final.pdf\">425W-Paper-4-Final<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-content\/uploads\/sites\/33929\/2025\/11\/425W-Paper-4-Final.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d12534dd-1b1c-4683-9b0b-2c47fe8b629d\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This page highlights my top three marketable skills and the artifacts that demonstrate them. Each artifact is either embedded on this page or linked as a PDF\/website so viewers can explore the full work. Skill 1: Cyber Risk &amp; Compliance CYSE 430 Final Exam &#8211; Risk Mitigation Strategies In this capstone exam essay, I combine&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cjmcdonald\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27342,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-json\/wp\/v2\/users\/27342"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-json\/wp\/v2\/pages\/218\/revisions\/433"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cjmcdonald\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}