To start off, this week consisted of a lot of the same things such as
researching NIST, understanding protocols, and researching cyber security itself. I
was given a printout of a compliance guideline from the university of Cincinnati to
look over as well as research it on my own. I was given the printout during my first
week of the internship but then realized it can be found online and t is not a
classified company resource. The following link leads directly to the source:
https://www.uc.edu/content/dam/uc/infosec/docs/Guidelines/NIST_171_Complian
ce_Guideline.pdf. Aside from the same NIST material, a little bit of action which I
received consisted of the same things such as BitLocker recovery for locked
accounts as well as user support in analyzing suspicious emails. When I was first
assigned with the phishing ticket, I already knew what to look for. I looked for the
email address first to see if anything looked out of the ordinary as well as the email
itself to check for any grammar errors. The email was from an external service
which was not in our organization, so we went through with simply removing the
email from the users email. Aside from that my time consisted of messing around
with a Microsoft azure 40-day trial. In here I got to check out how we can monitor
and support different accounts on the network. I am hoping to get my hands on
with some big name tools such as tenable vulnerability scanning going into next
week. I am aware that vulnerability scanning is a very big tool and would be a
great source of knowledge for me to obtain during this internship. Vulnerability
scanning is like the bread and butter for any cyber analyst so getting hands on with
that will really give me a great boost into my security career.
Leave a Reply