Phishing Email at City of Norfolk

Skill Demonstrated: Vulnerability Management
Problem: I was tasked with checking to see if the suspicious emails employees had sent to this email chain was indeed phishing emails, or real emails sent by other employees or businesses.
Action: Everyday onsite I would monitor the email, then use prior knowledge, or tools like Barracuda and other cites to see where each email was sent from or if an email address was used before to send phishing emails to someone else.
Result: This artifact displays that I understand key aspects of finding traits of suspicious emails, and show knowledge of usage of tools to further my research when protecting employees from phishing schemes.
CYSE 406:Memorandum on Data Protection:
49F9A701-58D7-4309-B9A1-DD7F215D2F36Skill Demonstrated: Researching cyber laws and creating a research memo
Problem: I was tasked with creating a research memo as a legislative research aide. I had to choose an cyber laws passed or proposed to research that effectively protect against cybersecurity threats.
Action: I chose to research The Cybersecurity Enhancement Act of 2014 using various government sites and referencing the NIST framework. I then began writing the memo highlighting what it is, its purpose, effects, and what to highlight in the letters the fake representative would write.
Result: I learned a lot about the importance of the Cybersecurity Enhancement Act. It was passed to maintain the protection of cyberspace from cybersecurity threats. It provided various forms of support that helps expand the research and development the bill. Including new programs and funding. I asked for the support of government entities, private-partner relationships, and academic institutions. I addressed the benefits of an improved workforce, scholarships, and nationwide cyber awareness programs. This all lead to the emphasis on the conclusion of how the policy has given the US a stronger defense against cyber attacks. Overall strengthening my ability to research, focusing on cyber assurance, creating important memorandums, and connecting cybersecurity to policymaking.
Information Systems Improved Decision Making
FE1BF53D-A0E7-4065-94C9-C92989474C57Skill Demonstrated: Research, Critical Thinking, Business Logistics, Vulnerability Management
Problem: Describe how any company is using information systems to improve their decision making
Action: I chose to do my assignment on Amazon. I researched everything about the company and how it continues to grow in sales each year. I highlighted facts about their business model, AI data & metrics system, high-quality/ velocity decision making. Since I was working at amazon, as a warehouse worker at the time, I included some of my personal references to further exclaim how the process works even involving the employees all over the world.
Result: As a result, this assignment allowed me to further my knowledge by practicing my researching skills. I drew connections from my personal experience and the information to fact check my sources. Additionally, I was able to connect my learnings about information systems to the business world. One of the main ideas I saw was how they continue to keep their systems secure, by maintaining a realistic budget. I can conclude that engaging in vulnerability management by making informed decisions regarding costs, needs, and efficiency, this is an essential skill to have when working in any profession, especially cybersecurity.