{"id":408,"date":"2026-03-05T15:54:48","date_gmt":"2026-03-05T15:54:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ksers001\/?page_id=408"},"modified":"2026-03-05T15:54:52","modified_gmt":"2026-03-05T15:54:52","slug":"cyse-368-journal-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ksers001\/sample-page\/internship-cyse-368\/cyse-368-journal-1\/","title":{"rendered":"CYSE 368 &#8211; Journal 1"},"content":{"rendered":"\n<p><br>At The Global Electronics Association, I have worked on several tasks of the 1st 50<br>hours relating to our organization&#8217;s security. The tasks I completed required extensive in-<br>depth analysis of our internal network and systems. I worked mostly on remediation tasks<br>related to penetration testing as we prepared for a retest. Additionally, I was responsible<br>for creating a Security Awareness Training module for Newly Hired employees and a<br>Phishing campaign to analyze how susceptible our employees were.<br>First, we reviewed the 84-page report and planned our remediation steps. I learned that<br>there are many vulnerabilities that could be exploited; however, some carry more weight<br>than others. I worked with my supervisor and team to remediate the high-risk threats. This<br>gave me valuable insight into the annual penetration testing process and how it<br>strengthens our defenses. The remediation process, which was required before retesting<br>on 2\/6\/2026, required me to update the weak password policy and assist with other critical<br>items. We strengthened our password policy to align with Synercomm&#8217;s recommendations<br>and industry standards. The penetration testing documentation gave me a clear view of the<\/p>\n\n\n\n<p>issues in our environment and how an attacker could exploit each vulnerability. We worked<br>on reviewing and implementing changes from 1\/23\/2026 to 2\/5\/2026.<br>Changes to the environment, such as password policy updates through Group Policy,<br>affect not only IT but the entire organization, so careful planning and communication were<br>required. Other changes required proper planning and documentation in case a rollback<br>was needed due to disrupted business operations. We would then review the change and<br>determine whether it represented an acceptable risk to the organization. I implemented<br>the password policy changes in the local Active Directory on 2\/2\/2026. This also included a<br>list of forbidden passwords, which included any domain or company names and terms.<br>In addition to Penetration testing remediation, I worked with KnowBe4 to create a Cyber<br>Security Awareness Training Module for newly hired employees. This training is important<br>because it will help mitigate the biggest weakness in any organization, the \u201cHuman<br>Factor.\u201d The training consisted of KnowBe4\u2019s Annual 45-minute training video. In addition<br>to creating this campaign, I used Knowbe4 to create a Simulated phishing campaign to<br>help evaluate our organizational risk. The campaign took place between 2\/4\/2026 \u2013<br>2\/6\/2026. The results of the camping exercise gave us insight into how susceptible our<br>employees are to phishing attempts. It showed me that ongoing training is detrimental to<br>an organization&#8217;s security posture.<br>Conclusion<\/p>\n\n\n\n<p>In conclusion, I found my hands-on involvement in Penetration testing remediation<br>gave me an exclusive look into current vulnerabilities, how they can be exploited, and<br>practical knowledge for resolving them. I understood the importance of documentation<br>and communication to our staff regarding changes in organizational security standards.<br>Using KnowBe4\u2019s platform was rewarding as well because it demonstrated the importance<br>of annual training and the risks it can help mitigate. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Annotations<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>At The Global Electronics Association, I have worked on several tasks of the 1st 50hours relating to our organization&#8217;s security. The tasks I completed required extensive in-depth analysis of our internal network and systems. I worked mostly on remediation tasksrelated to penetration testing as we prepared for a retest. Additionally, I was responsiblefor creating a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ksers001\/sample-page\/internship-cyse-368\/cyse-368-journal-1\/\">Read More<\/a><\/div>\n","protected":false},"author":24633,"featured_media":0,"parent":406,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/408"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/users\/24633"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/comments?post=408"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/408\/revisions"}],"predecessor-version":[{"id":409,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/408\/revisions\/409"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/406"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/media?parent=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}