{"id":521,"date":"2025-07-30T00:48:10","date_gmt":"2025-07-30T00:48:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jchris82\/?page_id=521"},"modified":"2025-07-30T03:30:42","modified_gmt":"2025-07-30T03:30:42","slug":"skills-and-artifacts","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jchris82\/skills-and-artifacts\/","title":{"rendered":"Skills and Artifacts"},"content":{"rendered":"\n<p>This page highlights three of my top professional skills and showcases supporting artifacts that demonstrate each one in action.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Skill 1: <strong>Cybersecurity Policy &amp; Compliance<\/strong><\/h3>\n\n\n\n<p><em>Able to analyze and build practical security governance frameworks through effective policy design, addressing domains such as physical security, data integrity, and incident response.<\/em><\/p>\n\n\n\n<p><strong>Artifacts:<\/strong><\/p>\n\n\n\n<ol>\n<li><strong>Security Policy: Design and Implementation (CYSE\u2013300)<\/strong><br>In this detailed academic project, I developed a corporate security policy covering five critical areas: physical security, confidentiality, integrity, availability, and incident response. The policy integrates recommendations from NIST standards and CISA best practices, emphasizing access controls, tiered data classification, and robust organizational processes to defend against threats. <a href=\"https:\/\/sites.wp.odu.edu\/jchris82\/2024\/02\/03\/security-policy-design-and-implementation\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jchris82\/2024\/02\/03\/security-policy-design-and-implementation\/\">https:\/\/sites.wp.odu.edu\/jchris82\/2024\/02\/03\/security-policy-design-and-implementation\/<\/a><\/li>\n\n\n\n<li><strong>Artifact 2: MOVEit Vulnerability Analysis<\/strong><br>An analytical breakdown of the 2023 CL0P ransomware attack on MOVEit. The paper covers the exploited zero\u2011day vulnerability (CVE\u20112023\u201134362), its global impact on corporate and government systems, and insights into policy failures, especially around patch management, vendor oversight, and intrusion detection frameworks.                                 <a href=\"https:\/\/sites.wp.odu.edu\/jchris82\/2024\/02\/03\/moveit-vulnerability-analysis\/\">https:\/\/sites.wp.odu.edu\/jchris82\/2024\/01\/21\/moveit-vulnerability-analysis\/<\/a><\/li>\n\n\n\n<li><strong>Artifact 3: CIA Triad \u2014 An Analysis<\/strong><br>This paper explores the foundational principles of the CIA triad: Confidentiality, Integrity, and Availability, as defined by NIST, and their critical role in designing effective information security policies. It discusses data classification, authorization vs. authentication, non-repudiation, and ensuring reliable data access across distributed environments. The conclusion emphasizes the triad as a practical \u201ctrust but verify\u201d framework for securing corporate information systems. <a href=\"https:\/\/sites.wp.odu.edu\/jchris82\/2024\/02\/03\/cia-triad-an-analysis\/\">https:\/\/sites.wp.odu.edu\/jchris82\/2024\/02\/03\/cia-triad-an-analysis\/<\/a><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Skill 2: Cybersecurity Analysis &amp; Threat Assessment<\/h3>\n\n\n\n<p>Able to analyze vulnerabilities, evaluate cyber threats, and interpret real-world attack scenarios, demonstrating practical knowledge of risk management and defense strategies.<\/p>\n\n\n\n<p><strong>Artifacts:<\/strong><\/p>\n\n\n\n<ol>\n<li><strong>Artifact 1: Exploring SCADA \u2014 Functionality and Vulnerabilities <\/strong>                                                     This research paper provides an overview of Supervisory Control and Data Acquisition (SCADA) systems, their five-tier operational structure, and the cybersecurity risks they face in modern industrial settings. It highlights how legacy infrastructure has evolved and the consequences of cyberattacks on critical systems\u2014referencing real-world incidents like the 2015 Ukraine power grid blackout. This artifact supports my understanding of industrial cybersecurity policy gaps and the need for integrated defenses in operational technology environments.                                            <a href=\"https:\/\/sites.wp.odu.edu\/jchris82\/2024\/04\/20\/exploring-scada-functionality-and-vulnerabilities\/\">Exploring SCADA: Functionality and Vulnerabilities<\/a><\/li>\n\n\n\n<li><strong>Bug Bounty Policy Review<\/strong><br>Analysis of bug bounty programs as a proactive approach to vulnerability management, discussing how ethical hacking contributes to threat detection and software security improvements. Includes evaluation of policy frameworks and real-world examples. <a href=\"https:\/\/sites.wp.odu.edu\/jchris82\/2023\/11\/18\/bug-bounty-policies\/\">https:\/\/sites.wp.odu.edu\/jchris82\/2023\/11\/18\/bug-bounty-policies\/<\/a><\/li>\n\n\n\n<li><strong>Cybersecurity Meme Impact Study<\/strong><br>A unique exploration of how cybersecurity culture and memes influence awareness, user behavior, and the broader security community\u2019s engagement with threat topics. Demonstrates ability to assess social factors in cybersecurity defense.                <a href=\"https:\/\/sites.wp.odu.edu\/jchris82\/2023\/10\/22\/cybersecurity-memes\/    \">https:\/\/sites.wp.odu.edu\/jchris82\/2023\/10\/22\/cybersecurity-memes\/    <\/a><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Skill 3: Resilience and Adaptability<\/h3>\n\n\n\n<p>Demonstrated resilience and adaptability by actively learning from challenges and setbacks, iterating through trial and error, and persistently refining practical projects to achieve meaningful progress in cybersecurity and software development.                               <\/p>\n\n\n\n<p><strong>Artifacts:<\/strong><\/p>\n\n\n\n<ol>\n<li><strong>Password Tracker<\/strong><br>A Python-based password management tool featuring a graphical interface and robust encryption to securely store user credentials. Developed through multiple iterations, this project reflects problem-solving skills and commitment to security best practices.<br><a class=\"\" href=\"https:\/\/github.com\/ExploitOwl\/password-tracker\">https:\/\/github.com\/ExploitOwl\/password-tracker<\/a><\/li>\n\n\n\n<li>I<strong>nternship Application Tracke<\/strong>r                                                                                                              An organized tracking system built with Python that helps manage internship applications, statuses, and notes. This project exemplifies attention to detail, data handling, and interface usability, developed through ongoing refinement                                  <a class=\"\" href=\"https:\/\/github.com\/ExploitOwl\/internship-application-tracker\">https:\/\/github.com\/ExploitOwl\/internship-application-tracker<\/a><\/li>\n\n\n\n<li><strong>GitHub Repository<\/strong>                                                                                                                                  A comprehensive portfolio of self-directed learning and cybersecurity projects demonstrating a range of technical skills, coding proficiency, and practical experience in software development. GitHub: <a class=\"\" href=\"https:\/\/github.com\/ExploitOwl\">https:\/\/github.com\/ExploitOwl<\/a><\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page highlights three of my top professional skills and showcases supporting artifacts that demonstrate each one in action. \ud83d\udee1\ufe0f Skill 1: Cybersecurity Policy &amp; Compliance Able to analyze and build practical security governance frameworks through effective policy design, addressing domains such as physical security, data integrity, and incident response. Artifacts: \ud83d\udd75\ufe0f\u200d\u2642\ufe0f Skill 2: Cybersecurity &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/jchris82\/skills-and-artifacts\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Skills and Artifacts<\/span><\/a><\/p>\n","protected":false},"author":26825,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jchris82\/wp-json\/wp\/v2\/pages\/521"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jchris82\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jchris82\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jchris82\/wp-json\/wp\/v2\/users\/26825"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jchris82\/wp-json\/wp\/v2\/comments?post=521"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jchris82\/wp-json\/wp\/v2\/pages\/521\/revisions"}],"predecessor-version":[{"id":557,"href":"https:\/\/sites.wp.odu.edu\/jchris82\/wp-json\/wp\/v2\/pages\/521\/revisions\/557"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jchris82\/wp-json\/wp\/v2\/media?parent=521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}