{"id":256,"date":"2025-05-18T23:27:38","date_gmt":"2025-05-18T23:27:38","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=256"},"modified":"2025-06-15T22:05:59","modified_gmt":"2025-06-15T22:05:59","slug":"ids-493","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ids-493\/","title":{"rendered":"IDS 493"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Reflection Essay Summary<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-left\">This reflection essay highlights how my interdisciplinary coursework at Old Dominion University developed three core cybersecurity skills:<br>\ud83d\udcd8<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/skills-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/skills-2\/\">&nbsp;<strong>Ethical communication<\/strong><\/a><br>\ud83d\udee0&nbsp;<strong><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/skills-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/skills-2\/\">Hands-on technical implementation<\/a><\/strong><br>\ud83e\udde0&nbsp;<strong><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/skills-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/skills-2\/\">Strategic, adaptable thinking<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">Skills are demonstrated through nine key artifacts:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>\ud83d\udcdd <\/strong>Communication &amp; Core Foundations<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ids-300w\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ids-300w\/\">\ud83d\udcd6\u00a0<\/a><em>IDS 300W Final Paper<\/em><br>Interdisciplinary analysis of ethics, policy, and technology.<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/law-ethics\/phil-355e\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/law-ethics\/phil-355e\/\">\ud83e\uddfe<\/a>\u00a0<em>PHIL 355E Ethical Case Analysis<\/em><br>Applied ethical reasoning to a real-world data privacy dilemma.<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/it-cyse-200t-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/it-cyse-200t-2\/\">\ud83d\udd17\u00a0<\/a><em>CYSE 200T Blockchain Policy Debrief<\/em><br>Explained technical risks to a non-technical audience.<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-270\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-270\/\">\ud83d\udc27<\/a>\u00a0<em>CYSE 270 Linux Labs<\/em><br>Developed skills in scripting, permissions, and user management.<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-300\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-300\/\">\ud83e\ude9f<\/a>\u00a0<em>CYSE 280 Windows Server Labs<\/em><br>Configured virtual servers and secure audit policies.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>\ud83e\uddea <\/strong>Technical &amp; Strategic Readiness<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cs-462\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cs-462\/\">\ud83c\udf10<\/a>\u00a0<em>CS 462 Protocol Analysis Lab<\/em><br>Used Wireshark to analyze DNS\/BGP and configure IDS\/IPS tools.<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-463\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-463\/\">\ud83d\udd10<\/a>\u00a0<em>CS 463 Encryption Report<\/em><br>Implemented AES\/DES and evaluated key management.<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-425w\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-425w\/\">\ud83e\udde9\u00a0<\/a><em>CYSE 425W Strategy Project<\/em><br>Created a national cyber policy balancing law, ethics, and security.<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ece-416\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ece-416\/\">\ud83d\udea8<\/a>\u00a0<em>CYSE 301 Intrusion Detection Lab<\/em><br>Designed and tested Snort rules in simulated attack scenarios.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/JessicaAliReflection.edited.edited.edited.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">JessicaAliReflection.edited.edited.edited<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reflection Essay Summary This reflection essay highlights how my interdisciplinary coursework at Old Dominion University developed three core cybersecurity skills:\ud83d\udcd8&nbsp;Ethical communication\ud83d\udee0&nbsp;Hands-on technical implementation\ud83e\udde0&nbsp;Strategic, adaptable thinking Skills are demonstrated through nine key artifacts: \ud83d\udcdd Communication &amp; Core Foundations \ud83e\uddea Technical &amp; Strategic Readiness<\/p>\n","protected":false},"author":15711,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/256"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/users\/15711"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/256\/revisions"}],"predecessor-version":[{"id":486,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/256\/revisions\/486"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/media?parent=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}