{"id":218,"date":"2022-10-23T18:37:54","date_gmt":"2022-10-23T18:37:54","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-12-10T02:01:59","modified_gmt":"2025-12-10T02:01:59","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dsmit1107\/skills-2\/","title":{"rendered":"Skills and Artifacts"},"content":{"rendered":"\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-large-font-size wp-elements-522e6620f730e7f80768631515e7c1b3\">SKILL ONE: Cybersecurity Systems &amp; Technical Operations<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-50346c56b6520ed3313f736272f24bb9\"><strong>Artifact 1: Password Cracking Assignment <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-a973aeca5835b0b8ecfd657e3f821c1a\">This assignment was my first real hands on look at how easy it is for weak passwords to get cracked. I used John the Ripper to break different password hashes, and it really opened my eyes to how attackers think. Once I saw how fast some passwords got cracked, it made a lot more sense why companies push for strong passwords and better security policies. This assignment helped me understand the offensive side of cybersecurity, and it definitely made me more aware of how important good password practices are.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-assignment205.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-assignment205.\"><\/object><a id=\"wp-block-file--media-1d6adeef-f6df-4d6c-84e0-24c0069e1606\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-assignment205.pdf\">annotated-assignment205<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-assignment205.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1d6adeef-f6df-4d6c-84e0-24c0069e1606\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-cc6d8682b01099c93c574072041de710\"><strong>Artifact 2: File Permissions Assignment<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-3bfb09936c0c03430bab2b83808a4f1e\">This assignment helped me learn how to properly manage file permissions in Linux and why access control matters so much. I worked with read, write, and execute permissions and saw how quickly a system can become vulnerable if permissions are set the wrong way. Doing this made me more confident navigating Linux and understanding how to lock down sensitive files so the wrong people can\u2019t access them.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Assignment-206.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-206.\"><\/object><a id=\"wp-block-file--media-5152e534-a915-4930-91ad-ee861efc4287\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Assignment-206.pdf\">annotated-Assignment-206<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Assignment-206.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5152e534-a915-4930-91ad-ee861efc4287\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-97784bb6e526228ede3398df58add492\"><strong>Artifact 3 \u2013 Network Traffic Tracing &amp; Sniffing Lab<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-179d53b5896d2146d9b844bfb2d69faa\">For this artifact, I used Wireshark to capture and analyze network traffic between my virtual machines. In my capture, I had 506 packets total, and I filtered them down to see specific types like ICMP and DNS traffic. Out of those 506 packets, 210 were ICMP pings, and later I filtered for DNS and saw 284 DNS packets in the capture.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/Assignment2_Compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment2_Compressed.\"><\/object><a id=\"wp-block-file--media-b4511ae7-6c06-4d2d-8f9c-9079344d5cb9\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/Assignment2_Compressed.pdf\">Assignment2_Compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/Assignment2_Compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b4511ae7-6c06-4d2d-8f9c-9079344d5cb9\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-large-font-size wp-elements-687f71da60e14fb72502cc533ba2a75e\"><strong>Skill Two: Risk Management, Policy, &amp; Organizational Awareness<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-3000e176562583b9aa0d98276bd48697\"><strong>Artifact 1: Company Research &amp; Organizational Risk Review<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-1a42f69518940a107473e0f6d1b19ea8\">For this assignment, I researched several companies including Dollar Tree, Enterprise Mobility, ABNB Federal Credit Union, and Amwins. To understand how real organizations deal with operational challenges, risk, and long term strategy. I analyzed how each company manages things like rapid expansion, digital transformation, customer expectations, sustainability, and industry competition.<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-ee572f6814b1104d8190777f00a1f304\">This assignment helped me think about risk on a business level how companies make decisions, how they respond to market changes, and how their strategies can succeed or fail depending on how well they manage uncertainty. It also strengthened my ability to ask the right questions during interviews or field research and to look deeper into how organizations operate behind the scenes.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Smith_CRA4_Company20Research.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Smith_CRA4_Company20Research.docx.\"><\/object><a id=\"wp-block-file--media-733e1b39-3b56-4fdb-8d77-c7bedf309f39\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Smith_CRA4_Company20Research.docx.pdf\">annotated-Smith_CRA4_Company20Research.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Smith_CRA4_Company20Research.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-733e1b39-3b56-4fdb-8d77-c7bedf309f39\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-44ce058d77cd4d61f113aa9b36b3b959\"><strong>Artifact 2: Cybersecurity Policy &amp; Risk Assessment Analysis<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-1d6d0d30a395000db6761b468d99397e\">In this policy analysis paper, I explored risk assessment as a major cybersecurity policy and how it impacts politicians, government technology, and national security. I discussed how risk assessment helps identify vulnerabilities before attacks happen, and how political campaigns, government agencies, and public officials rely on cybersecurity firms to protect their data.<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-9e4eaabd743fc74158c61d018d346e57\">This assignment forced me to think about risk not just technically, but politically and socially. I analyzed how organizations make decisions about protection, the role of personal protection in cybersecurity, and why risk assessments are becoming more important as technology becomes central to modern politics.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-policy20paper202.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-policy20paper202.\"><\/object><a id=\"wp-block-file--media-d59d6c6a-e38c-4562-b433-6067b08c3108\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-policy20paper202.pdf\">annotated-policy20paper202<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-policy20paper202.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d59d6c6a-e38c-4562-b433-6067b08c3108\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-cb10d449edf0a74ef74e8811eb40cd74\"><strong>Artifact 3: Economic Impact of Cybersecurity Policies<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-04b4f02f18530cea02a034f6b3f8aafb\">This paper focused on how cybersecurity policies can affect entire economies. I analyzed how the European Union responded after major cyberattacks and how updating their cybersecurity standards could strengthen their economy by increasing trust, reducing misinformation, and improving digital infrastructure.<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-789bd071c04ec141c2352d5aa0d8ee17\">I also explored how political constraints, fragmented markets, and past policy failures make cybersecurity policymaking complicated. This assignment helped me see how cyber policy isn\u2019t just about security. It shapes business growth, international relationships, and economic stability.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-policy20paper2042020202020202020-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-policy20paper2042020202020202020-1.\"><\/object><a id=\"wp-block-file--media-7b331c98-8441-4033-8d73-afd9ad0cafb2\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-policy20paper2042020202020202020-1.pdf\">annotated-policy20paper2042020202020202020-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-policy20paper2042020202020202020-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7b331c98-8441-4033-8d73-afd9ad0cafb2\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-large-font-size wp-elements-ca74c87a5466aa4244af96173c1b6c7c\"><strong>SKILL THREE: Interdisciplinary Problem-Solving &amp; Real-World Application<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-68b284e89abf2f8951900fddbb001bb2\"><strong>Artifact 1: Cyber Law Case Analysis<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-2d515f886cb1d26afd7440118b4d9326\">This assignment focused on breaking down a real cyber law case and understanding how the legal system handles digital evidence, cybercrime, warrants, and privacy. I analyzed how investigators apply laws like the CFAA, how warrants are structured, and what must be proven to justify a search. Working through the legal language helped me see how technical actions, like hacking, accessing systems, or using digital devices. Connect directly to criminal charges and legal consequences.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-40620cyber20law.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-40620cyber20law.\"><\/object><a id=\"wp-block-file--media-478e177d-4db6-4416-978a-699e6b998984\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-40620cyber20law.pdf\">annotated-40620cyber20law<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-40620cyber20law.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-478e177d-4db6-4416-978a-699e6b998984\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-55de5152a0b6a3a54be87b0562ce68d5\"><strong>Artifact 2: Windows System Security Project<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-d4b28674a3a4a2ec39baaf67c03f6b9e\">In this project, I researched ethical hacking and penetration testing to understand how cybersecurity professionals think and operate. I explained how ethical hackers look for weaknesses, test security controls, and use attacker style techniques to help organizations stay protected. I broke down different testing methods, real challenges penetration testers face, and why reporting and communication matter just as much as the technical work. This assignment required clear analysis, attention to detail, and an understanding of how attackers approach systems so defenders can stay one step ahead.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Research20Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Research20Paper.\"><\/object><a id=\"wp-block-file--media-afe2b081-53aa-4c78-be8a-db274716fb24\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Research20Paper.pdf\">annotated-Research20Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Research20Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-afe2b081-53aa-4c78-be8a-db274716fb24\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-26b0c6d34b7ba24e301342b30d14fe43\"><strong>Artifact 3: Leadership Reflection &amp; Theory Application<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-medium-font-size wp-elements-eaea5592844fab35c0dc0b3ba3c9907c\">This assignment helped me reflect on who I am as a leader and how different leadership theories show up in my real life. I connected concepts like Authentic Leadership and LMX to how I communicate, solve problems, and support the people around me. Writing this reflection made me realize that staying calm, being understanding, and leading with honesty are strengths I already have and skills I want to keep improving.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Learnig20and20action20paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Learnig20and20action20paper.\"><\/object><a id=\"wp-block-file--media-714a313c-e7bc-44c2-a8e3-4a6897c82257\" href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Learnig20and20action20paper.pdf\">annotated-Learnig20and20action20paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-content\/uploads\/sites\/30997\/2025\/12\/annotated-Learnig20and20action20paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-714a313c-e7bc-44c2-a8e3-4a6897c82257\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SKILL ONE: Cybersecurity Systems &amp; Technical Operations Artifact 1: Password Cracking Assignment This assignment was my first real hands on look at how easy it is for weak passwords to get cracked. I used John the Ripper to break different password hashes, and it really opened my eyes to how attackers think. Once I saw&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dsmit1107\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":25224,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-json\/wp\/v2\/users\/25224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-json\/wp\/v2\/pages\/218\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dsmit1107\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}