In my classes, I’ve learned how to conduct risk assessments and evaluate vulnerabilities within complex information systems. This process involves identifying potential threats, analyzing their likelihood and impact, and prioritizing them based on overall risk. I was able to apply this skill hands-on during my Cyber Clinic internship, where I conducted risk assessments for a local non-profit organization to identify potential risks and provide actionable recommendations.

Artifact 1

Reflection-Paper-3

Artifact 2

CS-465-Project

Artifact 3

Lab-2-Threat-Modeling