{"id":182,"date":"2024-04-24T23:27:26","date_gmt":"2024-04-24T23:27:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/?p=182"},"modified":"2024-04-24T23:30:05","modified_gmt":"2024-04-24T23:30:05","slug":"reflection-paper-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/2024\/04\/24\/reflection-paper-1\/","title":{"rendered":"Reflection Paper 1"},"content":{"rendered":"\n<p>         Being in a technical environment and having a idea of the importance of<br>computer security is nothing new to me. Getting hands on with troubleshooting and<br>account security is my bread and butter and has been for the last 2 \u00bd years. But<br>turning around and truly focusing on what goes on in the life of a security analyst<br>is something that is somewhat new to me. My first week as an intern security<br>analyst has brought me closer with some familiar terms such as NIST. NIST is a<br>acronym for the Nationals Institute of Standards and Technology. It is a<br>cybersecurity framework that provides businesses with a blueprint on what they<br>can implement to keep a secure online environment. It gives a better understanding<br>for security to all network users. On the first day of my internship my training<br>concluded of me going through the basic controls and protocols of NIST 800-171.<br>Much of my early days didn\u2019t include much asides from direct research on NIST.<br>After understanding the importance of NIST and how it can provide a great blue<br>print for the security infrastructure, I eventually moved on to beginning to learn a<br>bit more about cryptography. One tool that I got hands on with was bit locker. Bit<br>locker uses a low level device driver to encrypt and decrypt file operations. Bit<br>locker can be the cause of computers being locked out due to security reasons and<br>only able to be unlocked with bit locker recovery keys. Throughout the next of my<br>50 hours I hope to get deeper into other prioritize in cyber security as well as tools<br>used on a daily basis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Being in a technical environment and having a idea of the importance ofcomputer security is nothing new to me. Getting hands on with troubleshooting andaccount security is my bread and butter and has been for the last 2 \u00bd years&#8230;. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/hkhancyse368\/2024\/04\/24\/reflection-paper-1\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/posts\/182"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/users\/27219"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/posts\/182\/revisions\/183"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hkhancyse368\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}