{"id":458,"date":"2025-04-23T23:46:53","date_gmt":"2025-04-23T23:46:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ksm2024\/?page_id=458"},"modified":"2025-04-23T23:49:27","modified_gmt":"2025-04-23T23:49:27","slug":"narrative","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ksm2024\/narrative\/","title":{"rendered":"Narrative"},"content":{"rendered":"\n<p>Keeno Montalban<br>4\/1\/2025<br>Writing Assignment #2<br>Personal Narrative Essay<br>Introduction<br>When I was much younger, I was fascinated by technology. However, it wasn\u2019t until my<br>academic and professional experiences that I have found my passion for cybersecurity. My entire<br>journey has been shaped by some important moments in my life such as, exposure to ethical<br>hacking, coursework that has connected social science, and technology, and hands-on<br>experiences in security analysis. These moments not only influenced my decisions but also<br>helped me understand the interdisciplinary nature of cybersecurity.<br>Early Influences and The Academic Foundations<br>Growing up, I was always fascinated by how computers work. I can\u2019t count how many<br>I\u2019ve spent exploring software, troubleshooting technical issues, and reading about different types<br>of cyberthreats. However, my academic journey truly began when I officially enrolled at Old<br>Dominion University (ODU). All my coursework in computer science gave an insight to<br>fundamental programming and network security concepts, but it my exposure to interdisciplinary<br>studies that gave me a deeper understanding of cybersecurity\u2019s societal impact.<br>Some course I\u2019ve taken in particular have incorporated social science principles such as<br>criminology, psychology, and ethics that have helped me see cybersecurity way beyond coding<br>and firewalls. For example, Mcadams\u2019 (2001) theory of narrative identity, which has put an<br>emphasis on the role of personal experiences in shaping one\u2019s identity, has resonated with me as<br>I reflected on all my past motivations. Understanding human behavior have become as important<br>as understanding technical skills, especially within areas like threat intelligence and social<br>engineering.<br>The article reviews in my ePortfolio further strengthens the importance of<br>interdisciplinary connections. For example, in one of my reviews, I went over how insider threats<br>in organizations are sometimes linked to behavior patterns influenced by workplace culture. This<br>perspective helped broadened my perspective to cybersecurity, making me more aware of the<br>human factors that contribute to security breaches.<br>Also, some of my coursework in digital forensics has introduced me to the more the<br>technical and legal aspects of cyber investigations. I was drawn to the way forensic analysts<br>reconstructing cybercrimes by piecing together any digital evidence. This part of the coursework<br>emphasizes the importance of ethical considerations and legal frameworks, thus further shaping<br>my understanding of cybersecurity\u2019s much broader implications. The realization of cyber<br>investigations requires both technical and the ethical responsibility that\u2019s being reinforced by my<br>commitment to the field.<br>Moments in Academic Journey: Ethical Hacking and Threat Intelligence<br>One of the more important experiences in my journey was my first ethical hacking<br>course. At first, I was intimidated by the complexity of penetration testing tools and<br>methodologies. However, as dove right straight into real-world case studies, I became more<br>fascinated by the strategic thinking involved within vulnerability testing. As I recall a lab where<br>we simulated phishing attacks and analyzed how human psychology played a huge role in<br>security breaches. This experience help strengthened the foundation in becoming a penetration<br>and vulnerability tester.<br>Another defining moment in my academic journey was the hands-on coursework in<br>cybersecurity, where I worked in simulated network security monitoring and threat detecting<br>exercise. These types of activities exposed to the fast-paced environment of cyberthreat<br>intelligence and the importance of real-time data analysis. This type of practical experience<br>supported my desire to work in cybersecurity while also noting the need for interdisciplinary<br>approaches. As Smith (2017) stated, understanding the motivations behind cybercriminal<br>behavior is important in developing effective defense mechanisms.<br>My ePortfolio contains some discussion posts where I reflected on some real-world<br>cybersecurity incidents and their broad implications. Referring to a specific discussion. I<br>analyzed the impact of ransomware attacks on healthcare institutions, making an emphasis on not<br>just the financial costs bust also the ethical concerns that surround patient data security. These<br>discussions helped refine my analytical skills and reinforcing my belief in cybersecurity as field<br>that required continuous adaptation and constant learning.<br>Moving forward, my coursework experience included some expose to security operations<br>center (SOC) protocols, where I learned how to respond to active cyber threats. In one case, it<br>involved investigating an ongoing brute-force attack in corporate network. My role in<br>documenting in analyzing the attack patterns showed the importance of proactive threat detection<br>and response. This type of real-world application of my studies helped solidified my confidence<br>in pursuing cybersecurity as a career.<br>Connecting Social Science and Cybersecurity<br>One of the more eye-opening perspectives of my education was noticing how social<br>science principles connect with cybersecurity. With the rise of cyber-enabled workplace<br>deviance, which I studied in a research project, showed how technology can be used both<br>ethically and in unethical behavior in professional settings. Nguyen (2019) goes on about how<br>organizational culture and human behavior can influence cybersecurity risks, a concept which<br>became evident in my research.<br>Through one of my studies, I also learned that cybersecurity professionals must consider<br>not only technological solutions but also both the psychological and sociological factors that<br>contribute to different security vulnerabilities. This realization has some influence on my career<br>aspirations, thus pushing me towards roles that require both technical expertise and an<br>understanding of human behavior.<br>In my career paper, located in one the tabs in my ePortfolio, explores this idea by<br>analyzing the roles of security analysts in preventing cybercrimes. My paper goes over how<br>behavioral analysis can help predict and prevent insider threats, a topic that goes along with my<br>growing interest in cybercrime analysis. Also, my journal entries document my different<br>perspectives on cybersecurity ethics, specifically in relation to marginalized communities and<br>digital divide.<br>Moving forward, one of the more thought-provoking discussions in my coursework<br>involved a lot of analyzing the ethical implications of Artificial Intelligence (AI) within<br>cybersecurity. It\u2019s the potential AI-driven security solutions that raises concerns about privacy,<br>bias, and accountability. By engaging in these discussions, it helped me evaluate the correlation<br>of emerging technologies and ethical responsibilities, shaping my perspective on cybersecurity\u2019s<br>continuous evolving landscape.<br>Conclusion<br>As I continue my journey in cybersecurity career, I\u2019m very committed to have integrated<br>both technical and social science perspectives to address modern security challenges. My<br>academic experiences at ODU, along with practical exposure through course work, it has<br>provided me a solid foundation to pursue roles in cybercrime analysis, penetration testing, and<br>security architecture.<br>Cybersecurity itself is not simply about protecting systems; It\u2019s the understanding of<br>people behind the screens, both attackers and users. By continuing to apply interdisciplinary<br>approaches, I hope to contribute somewhat to the field and develop security solutions that<br>address both the technological and human factors.<br>My ePortfolio serves as reflection of my journey, showing my growth in the field and<br>commitment to lifelong learning. As I continue to build my career, I do plan to continue to<br>expand my knowledge, engaging in discussions on current emerging threats, and balancing both<br>technical and social science insights in order to make a meaningful impact in cybersecurity.<br>One of my future goals to achieve industry-recognized certifications, such as the<br>Certified Ethical Hacker (CEH) or Offensive Security certified Professional (OSCP) and<br>CompTIA Security + and A +. These certifications will not only verify that I understand the<br>cybersecurity field but, it will deepen my knowledge\/expertise in penetration testing and ethical<br>hacking, reinforcing my commitment to learning. Also, I aspire to contribute to cybersecurity<br>research, specifically in areas of threat intelligence and digital forensics, in order to advance the<br>field and develop innovated solutions for any cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keeno Montalban4\/1\/2025Writing Assignment #2Personal Narrative EssayIntroductionWhen I was much younger, I was fascinated by technology. However, it wasn\u2019t until myacademic and professional experiences that I have found my passion for cybersecurity. My entirejourney has been shaped by some important moments in my life such as, exposure to ethicalhacking, coursework that has connected social science, and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ksm2024\/narrative\/\">Read More<\/a><\/div>\n","protected":false},"author":29444,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ksm2024\/wp-json\/wp\/v2\/pages\/458"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ksm2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ksm2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksm2024\/wp-json\/wp\/v2\/users\/29444"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksm2024\/wp-json\/wp\/v2\/comments?post=458"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/ksm2024\/wp-json\/wp\/v2\/pages\/458\/revisions"}],"predecessor-version":[{"id":465,"href":"https:\/\/sites.wp.odu.edu\/ksm2024\/wp-json\/wp\/v2\/pages\/458\/revisions\/465"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ksm2024\/wp-json\/wp\/v2\/media?parent=458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}