{"id":252,"date":"2025-08-02T04:17:52","date_gmt":"2025-08-02T04:17:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse368internship\/?page_id=252"},"modified":"2025-08-02T04:17:52","modified_gmt":"2025-08-02T04:17:52","slug":"reflection-5","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse368internship\/reflection-5\/","title":{"rendered":"Reflection 5"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><br><strong>Name: Michelle Ayaim<br>Date: July 11, 2025<br>Organization: NIWC Atlantic<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-content\/uploads\/sites\/39241\/2025\/08\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"397\" src=\"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-content\/uploads\/sites\/39241\/2025\/08\/image.png\" alt=\"\" class=\"wp-image-253\" style=\"width:407px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-content\/uploads\/sites\/39241\/2025\/08\/image.png 622w, https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-content\/uploads\/sites\/39241\/2025\/08\/image-300x191.png 300w, https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-content\/uploads\/sites\/39241\/2025\/08\/image-470x300.png 470w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/a><\/figure>\n\n\n\n<p><br>     For the past few weeks, I&#8217;ve been shadowing cybersecurity specialists as they handle<br>network security and cybersecurity on two very distinct US Navy ships. Until recently, I had<br>assumed that a ship was a ship, but this is not the case. The United States Navy&#8217;s destroyers and aircraft carriers are both impressive ships with very diverse duties and configurations,<br>particularly when it comes to network security and cybersecurity standards.<\/p>\n\n\n\n<p><br>      Often called a DDG (Guided Missile Destroyer), a destroyer is a swift, compact warship<br>built for tactical combat. It seeks to perform several tasks, especially surface warfare, anti-<br>aircraft, and anti-submarine warfare. With a crew of around 300, destroyers are compact,<br>mission-focused vessels that are outfitted with all the tools necessary to strike, defend, and maneuver with ease. A carrier is a floating airbase, also referred to as a CVN (Nuclear-Powered Aircraft Carrier). It transports more than 70 airplanes and houses around 5,000 crew members. Its sole mission is to project power internationally by deploying planes for battle, surveying, and humanitarian assistance.<\/p>\n\n\n\n<p>      Their cybersecurity and network infrastructure differ according to their specific goals and sizes. Both ships come with ADNS (Automated Digital Network System), and this allows secure communication outside the ship. They also use the Nessus scanner to look for weaknesses in the ship&#8217;s network. These shared features are part of the Navy&#8217;s baseline cybersecurity package and provide basic threat prevention for both ships.<\/p>\n\n\n\n<p>      Beyond that, destroyers emphasize lean systems. They use technologies like ACAS for vulnerability scanning, VRAM for patch management, and Security Onion for intrusion detection. They employ Elastic Stack and RedSeal to monitor networks and analyze logs. These tools keep destroyers flexible, secure, and mission-ready while avoiding excessive complexity. <\/p>\n\n\n\n<p>     Carriers, on the other hand, dig deeper. Because of their size and crew, they have extra features like Career Development Team (CDT) capabilities for managing Sailors&#8217; professional development, as well as more advanced meteorology and GPS systems to assist flight operations. Carriers also have X-ray screening installations to deal with the large volume of cargo and the people they handle. <\/p>\n\n\n\n<p>     Their cybersecurity products are designed to handle larger, more complicated networks with increased resources and expanded responsibilities. Both ships depend on ROM 3, a technology for managing retail shop activities onboard, like inventory monitoring and transaction processing. However, carriers frequently have extended ROM 3 modules due to increased staff and retail demand. <\/p>\n\n\n\n<p>     Nonetheless, destroyers are intended for speed and precision with simpler systems, whereas carriers are designed for size, coordination, and worldwide military projection. Their cybersecurity settings mirror differences, which are better suited for the work they do. Never in a million years would I have known such information. There hasn\u2019t been a dull moment for me in this internship, and I am loving every moment of it as well as learning as much as I can<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Michelle AyaimDate: July 11, 2025Organization: NIWC Atlantic For the past few weeks, I&#8217;ve been shadowing cybersecurity specialists as they handlenetwork security and cybersecurity on two very distinct US Navy ships. Until recently, I hadassumed that a ship was a ship, but this is not the case. The United States Navy&#8217;s destroyers and aircraft carriers&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse368internship\/reflection-5\/\">Read More<\/a><\/div>\n","protected":false},"author":22308,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-json\/wp\/v2\/pages\/252"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-json\/wp\/v2\/users\/22308"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-json\/wp\/v2\/comments?post=252"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-json\/wp\/v2\/pages\/252\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-json\/wp\/v2\/pages\/252\/revisions\/254"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse368internship\/wp-json\/wp\/v2\/media?parent=252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}