{"id":264,"date":"2025-08-09T13:10:34","date_gmt":"2025-08-09T13:10:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/?p=264"},"modified":"2025-08-09T13:10:34","modified_gmt":"2025-08-09T13:10:34","slug":"reflection-paper-2-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/2025\/08\/09\/reflection-paper-2-2\/","title":{"rendered":"Reflection Paper 2"},"content":{"rendered":"\n<p>Katie Avalo<br>Professor Duvall<br>Cybersecurity Internship<br>06 August 2025<br>                                                          Cybersecurity Internship<br>During these fifty hours, numerous obstacles were faced. But with each obstacle faced, I<br>was presented with a lesson to be learned. I was able to see cyber threats in real-time and observe<br>how quickly they can occur. It opened my eyes to the reality of it. So far, I knew in theory but<br>not in practice. In class, I was always told that there was no way a system could be 100% secure<br>and I was able to know how when I secured my instance so much, I locked myself out of it!<br><\/p>\n\n\n\n<p>For starters, the company website had been compromised. At first, I wasn\u2019t sure if it had<br>been the link that was sent to me or if there was something wrong. When I would look up the<br>website online and click on the website, it would redirect me to suspicious websites such as<br>\u201cFacebook\u201d, a fake Facebook login page. This was a phishing scam, and I suspected the website<br>could have been compromised by malware injection or cross-site scripting. This was obviously<br>not good for the company.<br><\/p>\n\n\n\n<p>One of the issues was that the website really had not been looked at or used much. An<br>important thing to fix to avoid this from happening is to monitor the website and even enable a<br>web application firewall. It is important to maintain client trust. Even if it did not have a lot of<br>traffic, a customer seeing that they are being redirected to suspicious websites while trying to<br>access their account might not feel secure that their data is safe.<br><\/p>\n\n\n\n<p>While I was trying to SSH into my instance, I could not access my key. To help me<br>access the key, it was being shared with me using a local host. Before I was able to access itsomeone else had accessed it, or at least tried to. This showed me just how quickly these sorts of<br>things can happen.<\/p>\n\n\n\n<p><br>Lastly, as I was editing configurations to harden my instance, I ended up making too<br>strict password management rules. The SSH was still enabled, but I had somehow stopped being<br>the superuser, with no way of changing my password. My instance ended up crashing. My new<br>task was to recover the instance and reconfigure the password management. This way I would<br>be able to become the superuser again.<\/p>\n\n\n\n<p><br>I did this by copying the instance volume and mounting it onto another instance. Once I<br>was in, I reconfigured the password rules and changed the rules for sudo. At the beginning, it<br>was not working because I kept confusing the original with the recovery instance. Once I<br>reconfigured, I remounted the volume back on the original and was able to log in.<br><\/p>\n\n\n\n<p>This internship has provided me with opportunities to learn and to apply my theoretical<br>knowledge in a real work environment. I was able to understand the seriousness of securing<br>websites and the importance of constant monitoring. I had never had to recover a broken instance<br>before, it was nice to get experience in doing that as I heard it can be common.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Katie AvaloProfessor DuvallCybersecurity Internship06 August 2025 Cybersecurity InternshipDuring these fifty hours, numerous obstacles were faced. But with each obstacle faced, Iwas presented with a lesson to be learned. I was able to see cyber threats in real-time and observehow quickly&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/katieaportfolio\/2025\/08\/09\/reflection-paper-2-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30564,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/posts\/264"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/users\/30564"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/comments?post=264"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/posts\/264\/revisions"}],"predecessor-version":[{"id":265,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/posts\/264\/revisions\/265"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/media?parent=264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/categories?post=264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/tags?post=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}