CYSE 425 Mid-Term Paper

A Review of the National Cybersecurity Strategy 2023 Caleb Mayo Old Dominion University CYSE 425W 11/3/2023 Introduction/Overview The United States government has created this strategy to combat the emerging and prevalent threats to the nation’s cybersecurity as well as build a solid foundation for information security in critical sectors. This document is meant to address…

Internship Reflection Paper 3

In  the final coming weeks of my internship, I feel as though I am gaining a little bit more responsibility. My Supervisor has me working with the Auditing team for the next round of audits going on at the Library of Virginia, and I am very excited. There is also an internship showcase coming up,…

Access Control Policy Draft

Access Control Policy General Overview: Research and Development must have access divided and specified for each user based on their responsibilities and duties in this division. To do so, all roles and responsibilities for each user should be identified and documented. Account Management Team Research and Development Separation of Duties:  Not every user should have…

Week 2 Network Diagram (2nd Draft)

Network Diagram Risk Management Standard Network Design Client Devices Network Monitoring Roles and Responsibilities Information Security Officer System Administrator Wi-Fi and Routing Routers Firewalls Switches Workstations and Personal Devices Workstations BYOD Policy Security Awareness Training

Week 8 Incident Response Plan

Virginia State Archive Incident Response Plan Purpose: This document is to be used to inform and be adhered to in the possibility of a Data Security Breach or security incident, developed using the NIST Incident Response Plan. Roles and Responsibilities: Incident Response Team Leader: Responsible for the overall mission of the Incident Response Team and…

Week 7 AWS Evaluation and Analysis

Analysis AWS Infrastructure Amazon Web Services uses a Shared-Responsibility Model for the Security Infrastructure of their virtual environments, which works tremendously well due to its cloud-based nature. As you can see on AWS’ own model below, AWS secures the background infrastructure that allows your virtual environment to run, the storage, the database accessed and the…

CYSE 368 Internship Reflection Paper 2

Reflection Paper # 2               At this point in my internship, I have done a lot of cool things on the side of Information Security. One of my most proud and somewhat exciting projects I have worked on is creating a robust and detailed network diagram for a small business. When I was tasked with…

CYSE 368 Internship Reflection Paper 1

Internship Reflection Paper 1 Caleb Mayo               Interning at the Library of Virginia has been a very good opportunity for me in many ways. The first day had me very nervous, as I did not know what to expect, but as the day went on, I was more accustomed to it. From the start, I…