As the weeks have progressed I have begun to learn more of how information security and cybersecurity are rooted into the company I work with.  This journal has taken a little longer to write due to me being out of work with Covid. During the testing process and finding out the quarantine guidelines, I was able to see how the safety measures resemble security practices. In obvious ways, this is security in relation to one’s health and the health of those around them. In further contemplation, I see how if someone contracts Covid and is able to potentially infect someone of high importance or a supervisor, then that leaves a level of administration or security somewhat vulnerable. There are several different floors and commands within the one building I work in, so if I was allowed to come to work infected that could jeopardize not only my company and their integrity but the various others within the same location. So it is very beneficial and crucial that my company continues their vigilant actions in regards to possible outbreaks and infections. Overall I appreciate my workplace and I have just been able to actively learn day by day. That’s not the only thing I enjoy about my job. Also in cybersecurity and information security I enjoy an ever changing dynamic resulting in different ways in which you can further your expertise and have the chance to learn. 

Once I recovered and was back to work, I was able to begin training and further my knowledge of company policy for classified information as well as for troubleshooting calls that deal with classified machines. One of the biggest things that is required is the protection of ip addresses of classified machines. There is zero tolerance for the ip address of these machines to be disclosed over the phone or in any communication unless it is specifically required for troubleshooting. To discuss the address of the machines on the phone or in general could be a security violation because the phones are considered unclassified forms of communication so that would be considered spillage. This leaves that classified information vulnerable to be exploited by a potential malicious party. In addition to this, handling classified information and troubleshooting from the service desk is also done on a classified machine to keep any troubleshooting separated from classified,in comparison to  unclassified machines, to also prevent any issues or spillage. It a

Is also a a requirement for Documentation to be very detailed because for any ticket that is done regarding troubleshooting or assistance in resolving IT issues for classified machines, there are two tickets created: one for the classified system and one for the unclassified system. This is for clear documentation on anything done for the issue and it’s in any record for the customer in case it needs to be referenced.  One challenge is that the number of tools we normally use to handle “unclass” machines is more limited when it comes to handling classified machines due to the level of security. Most of our tools run off scripts that can remote into machines and that is not something they would want easily available with classified machines because that leaves a huge vulnerability that could be exploited at any time. I am still continuing my internship with an open mind, and I look forward to any and every bit of knowledge I can gain and what this environment can teach me.