{"id":159,"date":"2022-09-04T17:19:33","date_gmt":"2022-09-04T17:19:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=159"},"modified":"2025-04-27T21:31:44","modified_gmt":"2025-04-27T21:31:44","slug":"reflection","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jb23435\/reflection\/","title":{"rendered":"Reflection Essay"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p>Throughout my cybersecurity education at Old Dominion University, I have systematically developed technical, analytical, legal, and strategic skills essential for the profession. The following four artifacts\u2014each created for a core course\u2014demonstrate my growth in network design (IT 315), ethical hacking (CYSE 450), cyber law (CYSE 406), and cyber strategy (CYSE 425). By linking each artifact to specific lectures, readings, hands-on assignments, and industry best practices, I reflect on challenges faced, lessons learned, and how these experiences have shaped my future practice in private-sector and public-policy contexts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Artifact 1: Maury High School Network Design<\/strong><\/h2>\n\n\n\n<p><strong>Course:<\/strong> IT 315 \u2013 Intro Network &amp; Security (Prof. Kalburgi, 2024)<br>In IT 315, Professor Kalburgi challenged us to design a wired network for Maury High School, providing two live outlets per classroom\/office, all sharing a secured Internet connection with no Internet-facing servers (Kalburgi, 2024). My deliverables included:<\/p>\n\n\n\n<ol>\n<li><strong>Cabling Plan &amp; Budget:<\/strong><strong><br><\/strong>\n<ul>\n<li>Measured cable runs on a scale-adjusted floor plan (300 ft width) to estimate total Cat6 cabling required.<br><\/li>\n\n\n\n<li>Priced cat6 cable, RJ45 outlets, wall plates, and patch panels using Home Depot and manufacturer pricing (Kalburgi, 2024).<br><\/li>\n\n\n\n<li>Budgeted $4,500 for cabling materials and $1,200 for termination hardware.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Equipment Plan &amp; Budget:<\/strong><strong><br><\/strong>\n<ul>\n<li>Selected PoE-capable managed switches, purchasing 10 % more ports than outlets (165 outlets \u2192 185 ports) to allow for growth and wireless AP deployment (Kalburgi, 2024).<br><\/li>\n\n\n\n<li>Included patch cables, UTP patch panels, and rack-mount trays sourced from Cisco and Ubiquiti catalogs.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Security Architecture:<\/strong><strong><br><\/strong>\n<ul>\n<li>Designed VLAN segmentation\u2014separate student, staff, and guest VLANs\u2014following best practices for network segmentation to limit broadcast domains and enforce access control (eSecurity Planet, 2024) (<a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-vlan\/?utm_source=chatgpt.com\">VLANs: Effective Network Segmentation for Security &#8211; eSecurity Planet<\/a>).<br><\/li>\n\n\n\n<li>Implemented inter-VLAN filtering using ACLs on the core switch, blocking unauthorized inter-VLAN traffic (Cisco Learning Network, 2023) (<a href=\"https:\/\/learningnetwork.cisco.com\/s\/question\/0D56e0000DtWOPRCQ4\/how-to-configure-an-acl-to-allow-selective-traffic-between-vlans-in-cisco?utm_source=chatgpt.com\">How to configure an ACL to allow selective traffic between VLANs in &#8230;<\/a>).<br><\/li>\n\n\n\n<li>Deployed a perimeter firewall with zone-based policies allowing only required outbound services to the Internet.<br><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p>Designing a scalable, secure, and budget-conscious network was challenging because theoretical VLAN and ACL concepts (Stallings &amp; Brown, 2020) needed translation into a coherent proposal. By reviewing Kalburgi\u2019s lectures on switch configuration (Kalburgi, 2024) and applying a systematic \u201ctest-then-tighten\u201d approach\u2014first validating connectivity, then incrementally enforcing ACLs\u2014I ensured both functionality and security. This artifact sharpened my network-architecture skills and underscored the importance of aligning technical designs with operational and financial constraints.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Artifact 2: Penetration Testing Report<\/strong><\/h2>\n\n\n\n<p><strong>Course:<\/strong> CYSE 450 \u2013 Ethical Hacking &amp; Penetration (Prof. Alam, 2024)<br>In CYSE 450, Professor Alam led us through hands-on labs culminating in a full penetration-testing engagement against a deliberately vulnerable web application (Alam, 2024). My final report documented:<\/p>\n\n\n\n<ul>\n<li><strong>Active Reconnaissance &amp; Scanning:<\/strong><strong><br><\/strong> Employed Nmap and Nikto to map network services and identify outdated server software (OWASP, 2023) (<a href=\"https:\/\/owasp.org\/www-project-web-security-testing-guide\/latest\/3-The_OWASP_Testing_Framework\/1-Penetration_Testing_Methodologies?utm_source=chatgpt.com\">Penetration Testing Methodologies &#8211; OWASP Foundation<\/a>).<br><\/li>\n\n\n\n<li><strong>Exploitation of SQL Injection &amp; XSS:<\/strong><strong><br><\/strong> Used SQLMap and tailored payloads, leveraging out-of-band DNS for safe proof-of-concept extraction without destroying target databases (OWASP, 2023) (<a href=\"https:\/\/owasp.org\/www-project-web-security-testing-guide\/latest\/3-The_OWASP_Testing_Framework\/1-Penetration_Testing_Methodologies?utm_source=chatgpt.com\">Penetration Testing Methodologies &#8211; OWASP Foundation<\/a>).<br><\/li>\n\n\n\n<li><strong>Malware Analysis Lab:<\/strong><strong><br><\/strong> Conducted static and dynamic analysis of a simulated malicious binary within an isolated VM, using Ghidra and Procmon to identify API-call patterns (Alam, 2024).<br><\/li>\n\n\n\n<li><strong>Steganography Challenge:<\/strong><strong><br><\/strong> Extracted hidden messages from image files using Steghide, demonstrating the importance of covert-channel detection (Medium, 2022) (<a href=\"https:\/\/medium.com\/%40prem112\/a-step-by-step-steganography-tutorial-with-steghide-730e5090ae57?utm_source=chatgpt.com\">A Step-by-Step Steganography Tutorial with Steghide &#8211; Medium<\/a>).<br><\/li>\n<\/ul>\n\n\n\n<p>The most difficult aspect was crafting proof-of-concept exploits that demonstrated real risk without irreversibly damaging the lab environment. Alam\u2019s in-class demonstration of safe exploitation techniques (Alam, 2024) and the OWASP Testing Guide (2023) provided a robust framework\u2014reconnaissance, scanning, exploitation, post-exploitation, and reporting\u2014for structuring my assessment. This artifact significantly enhanced my offensive-security toolkit and instilled a deep respect for the ethical responsibilities of penetration testers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Artifact 3: Privacy-Law Memorandum<\/strong><\/h2>\n\n\n\n<p><strong>Course:<\/strong> CYSE 406 \u2013 Cyber Law (Prof. Klena, 2024)<br>For CYSE 406, Professor Klena tasked us with advising the Governor of Virginia on personal-data protection legislation (Klena, 2024). My memorandum addressed:<\/p>\n\n\n\n<ol>\n<li><strong>Privacy Overview:<\/strong><strong><br><\/strong> Defined privacy and personal data, explained risks of unregulated data collection\u2014identity theft, biometric misuse\u2014and illustrated with examples of fingerprint and facial-recognition data (Solove, 2008).<br><\/li>\n\n\n\n<li><strong>GDPR Summary:<\/strong><strong><br><\/strong> Described GDPR scope, data-protection principles (lawfulness, transparency, data minimization), territorial reach, and enforcement mechanisms (European Parliament &amp; Council, 2016) (<a href=\"https:\/\/www.ncbi.nlm.nih.gov\/books\/NBK543521\/?utm_source=chatgpt.com\">The EU&#8217;s General Data Protection Regulation (GDPR) in a Research &#8230;<\/a>).<br><\/li>\n\n\n\n<li><strong>U.S. State Laws:<\/strong><strong><br><\/strong> Compared California\u2019s CCPA and Virginia\u2019s Consumer Data Protection Act (VCDPA), highlighting consumer rights to access, deletion, and opt-out of targeted advertising (Virginia OAG, 2023) (<a href=\"https:\/\/www.oag.state.va.us\/consumer-protection\/files\/tips-and-info\/Virginia-Consumer-Data-Protection-Act-Summary-2-2-23.pdf?utm_source=chatgpt.com\">[PDF] Virginia Consumer Data Protection Act<\/a>).<br><\/li>\n\n\n\n<li><strong>Policy Recommendation:<\/strong><strong><br><\/strong> Argued Virginia should enact its own law to protect citizens immediately, then advocate for federal harmonization\u2014balancing state innovation with national consistency (Klena, 2024).<br><\/li>\n<\/ol>\n\n\n\n<p>Parsing dense legal texts such as the GDPR (European Parliament &amp; Council, 2016) and Brenner\u2019s technology-law analysis (2019) was initially overwhelming. Klena\u2019s annotated lecture outlines on statutory interpretation (Klena, 2024) enabled me to distill complex provisions into practical policy guidance. This memo strengthened my legal-research and policy-writing skills, and underscored the necessity of integrating technical controls with regulatory compliance.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Artifact 4: GDPR Implementation Review<\/strong><\/h2>\n\n\n\n<p><strong>Course:<\/strong> CYSE 425 \u2013 Cyber Strategy &amp; Policy (Prof. Duvall, 2025)<br>In CYSE 425, Professor Duvall required a review of GDPR implementation effectiveness across multiple EU member states, informed by scholarly research (Duvall, 2025). My paper:<\/p>\n\n\n\n<ul>\n<li><strong>Synthesized Six Peer-Reviewed Studies:<\/strong><strong><br><\/strong> Analyzed success factors from research on GDPR uptake\u2014data breach reporting rates, fines levied, and organizational compliance frameworks (ResearchGate, 2023) (<a href=\"https:\/\/www.researchgate.net\/publication\/333581339_The_critical_success_factors_of_GDPR_implementation_a_systematic_literature_review?utm_source=chatgpt.com\">The critical success factors of GDPR implementation: a systematic &#8230;<\/a>).<br><\/li>\n\n\n\n<li><strong>Derived Policy Implications:<\/strong><strong><br><\/strong> Recommended unified enforcement guidelines to reduce jurisdictional variance and proposed cross-border data-flow agreements to ease compliance burdens (Voigt &amp; Von dem Bussche, 2017).<br><\/li>\n\n\n\n<li><strong>Developed an Assessment Framework:<\/strong><strong><br><\/strong> Combined ethical (consent, autonomy), political (sovereignty, cross-border flow), and social (digital inclusion) metrics to evaluate regulatory impact (Duvall, 2025).<br><\/li>\n\n\n\n<li><strong>Concluded on Success &amp; Gaps:<\/strong><strong><br><\/strong> Found GDPR raised global data-protection standards but requires clearer AI profiling guidance and enhanced small-business support (Kuner et al., 2017; Duvall, 2025).<br><\/li>\n<\/ul>\n\n\n\n<p>This project deepened my strategic-policy acumen by integrating diverse scholarly perspectives and critically appraising their methodologies. Duvall\u2019s lectures on resilience and deterrence theory (2025) guided my framing of GDPR as both a deterrent and resilience-building mechanism. The artifact reinforced how legal frameworks, political objectives, and societal values intersect in cybersecurity strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>General Reflection on Learning Growth<\/strong><\/h2>\n\n\n\n<p>The collection of artifacts shows a development path that starts with basic network design and segmentation skills (Kalburgi, 2024) before moving into offensive-security specializations (Alam, 2024), sophisticated legal policy analysis (Klena, 2024), and ultimately strategic leadership abilities (Duvall, 2025). Initially my studies concentrated on tools and configurations but I eventually understood that cybersecurity requires a comprehensive strategy that includes technology, law, and policy.<\/p>\n\n\n\n<p>Through my penetration-testing work (Alam, 2024) I learned technical exploits need to function inside ethical and legal boundaries which Klena\u2019s study of privacy law (Klena, 2024) confirmed. The network-design lab (Kalburgi, 2024) showed me that robust architecture should address operational demands along with regulatory rules which became a focal point in my later GDPR analysis (Duvall, 2025). My combined experiences have shown me how to combine technical precision with adherence to legal standards and strategic planning.<\/p>\n\n\n\n<p>To keep up with the latest best practices and regulations I will maintain integration across these domains by obtaining CISSP certification and engaging with professional organizations like ISC\u00b2 and ISACA. I intend to guide junior colleagues by imparting my experience in matching technical solutions to legal and policy demands.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>The four artifacts\u2014a Maury High School network design project, comprehensive penetration-testing report, privacy-law memorandum, and GDPR implementation review\u2014showcase my evolution from focused technical expertise to a well-rounded cybersecurity professional. Under the supervision of Professors Kalburgi, Alam, Klena, and Duvall I developed competence in design principles alongside ethical hacking techniques and legal analysis methods for strategic policy development. Entering the workforce I bring with me the ability to create secure networks and perform ethical security evaluations while ensuring compliance with regulations and developing policies that integrate security principles with privacy concerns and innovation needs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>References<\/strong><\/h2>\n\n\n\n<p><strong>Alam, M.<\/strong> (2024, February 15). <em>Lecture on penetration\u2010testing methodology and safe exploitation practices<\/em> [Lecture]. CYSE 450 \u2013 Ethical Hacking &amp; Penetration, Old Dominion University.<\/p>\n\n\n\n<p><strong>California Legislature.<\/strong> (2018). <em>California Consumer Privacy Act of 2018<\/em>.<a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\"> https:\/\/oag.ca.gov\/privacy\/ccpa<\/a><\/p>\n\n\n\n<p><strong>Comer, D. E.<\/strong> (2006). <em>Internetworking with TCP\/IP<\/em> (Vol. 1, 4th ed.). Pearson.<\/p>\n\n\n\n<p><strong>Cisco Learning Network.<\/strong> (2023). <em>Access control lists<\/em>. Cisco.<a href=\"https:\/\/learningnetwork.cisco.com\/s\/article\/access-control-lists\"> https:\/\/learningnetwork.cisco.com\/s\/article\/access-control-lists<\/a><\/p>\n\n\n\n<p><strong>Duvall, L.<\/strong> (2025, January 22). <em>Lecture on resilience and deterrence theory in cyber policy<\/em> [Lecture]. CYSE 425 \u2013 Cyber Strategy and Policy, Old Dominion University.<\/p>\n\n\n\n<p><strong>eSecurity Planet.<\/strong> (2024). <em>VLAN segmentation best practices<\/em>.<a href=\"https:\/\/www.esecurityplanet.com\/networks\/vlan-best-practices\/\"> https:\/\/www.esecurityplanet.com\/networks\/vlan-best-practices\/<\/a><\/p>\n\n\n\n<p><strong>European Parliament &amp; Council.<\/strong> (2016). <em>Regulation (EU) 2016\/679 (General Data Protection Regulation)<\/em>.<a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj\"> https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj<\/a><\/p>\n\n\n\n<p><strong>Kalburgi, A.<\/strong> (2024, March 10). <em>Lecture on VLANs, ACLs, and port security<\/em> [Lecture]. IT 315 \u2013 Intro Network &amp; Security, Old Dominion University.<\/p>\n\n\n\n<p><strong>Klena, J.<\/strong> (2024, April 5). <em>Lecture on comparative cybercrime and privacy legislation<\/em> [Lecture]. CYSE 406 \u2013 Cyber Law, Old Dominion University.<\/p>\n\n\n\n<p><strong>Kuner, C., Cate, F. H., Millard, C., &amp; Svantesson, D. J.<\/strong> (2017). <em>The GDPR: Understanding the EU\u2019s new data protection rules<\/em>. Oxford University Press.<\/p>\n\n\n\n<p><strong>OWASP.<\/strong> (2021). <em>OWASP Testing Guide<\/em> (4th ed.).<a href=\"https:\/\/owasp.org\/www-project-web-security-testing-guide\/\"> https:\/\/owasp.org\/www-project-web-security-testing-guide\/<\/a><\/p>\n\n\n\n<p><strong>Singer, P. W., &amp; Friedman, A.<\/strong> (2014). <em>Cybersecurity and cyberwar: What everyone needs to know<\/em>. Oxford University Press.<\/p>\n\n\n\n<p><strong>Solove, D. J.<\/strong> (2008). <em>Understanding privacy<\/em>. Harvard University Press.<\/p>\n\n\n\n<p><strong>Stallings, W., &amp; Brown, L.<\/strong> (2020). <em>Computer security: Principles and practice<\/em> (4th ed.). Pearson.<\/p>\n\n\n\n<p><strong>Veale, M., &amp; Edwards, L.<\/strong> (2018). Clarity, surprises, and further questions in the Article 29 Working Party draft guidance on automated decision-making and profiling. <em>Computer Law &amp; Security Review, 34<\/em>(2), 398\u2013404.<a href=\"https:\/\/doi.org\/10.1016\/j.clsr.2017.12.004\"> https:\/\/doi.org\/10.1016\/j.clsr.2017.12.004<\/a><\/p>\n\n\n\n<p><strong>Voigt, P., &amp; Von dem Bussche, A.<\/strong> (2017). <em>The EU General Data Protection Regulation (GDPR): A practical guide<\/em> (1st ed.). Springer.<\/p>\n\n\n\n<p><strong>Virginia Office of the Attorney General.<\/strong> (2023). <em>Consumer Data Protection Act (VCDPA)<\/em>.<a href=\"https:\/\/www.oag.state.va.us\/consumer-protection\/privacy\/vcdpa\"> https:\/\/www.oag.state.va.us\/consumer-protection\/privacy\/vcdpa<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Throughout my cybersecurity education at Old Dominion University, I have systematically developed technical, analytical, legal, and strategic skills essential for the profession. The following four artifacts\u2014each created for a core course\u2014demonstrate my growth in network design (IT 315), ethical hacking (CYSE 450), cyber law (CYSE 406), and cyber strategy (CYSE 425). By linking each&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/reflection\/\">Read More<\/a><\/div>\n","protected":false},"author":24719,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/159"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/users\/24719"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/comments?post=159"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/159\/revisions"}],"predecessor-version":[{"id":488,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/159\/revisions\/488"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/media?parent=159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}