Skills

Essential Work Habits

My Experience as a SWCC operator in Naval Special Warfare has shaped my work habits. My professional experience in Naval Special Warfare required a detail-oriented approach to mission planning, maritime navigation, heavy weapons manipulation, as well as combat medicine. I also became proficient in multi-tasking, meeting timelines, working under pressure, and working as part of a team as well as completing individual tasks. I have been transferring the lessons from these learned habits into student life and becoming proficient in the field of cybersecurity.

 

Solid Technical Foundation

  • While serving in Naval Special Warfare, I worked with mission planning systems, communications equipment, and navigation technology that required a strong understanding of system architecture, operational procedures, and equipment maintenance.
  • Going forward I plant to learn the depths of cybersecurity and technology in order to build upon the skills I obtained in my previous career.  A key basic of expanding my cyber knowledge was understanding the CIA triad.
  • Authentication vs Authorization

     

    BLUF

    Authentication is process designed to prove that you are who you say you are, while Authorization is the act of granting permission to access secured files or data.        ( “Authentication vs. authorization”).

     

    Introduction

    The CIA uses a triad known as AIC (availability, integrity and confidentiality) as an organizational framework for dealing with cybersecurity and the handling of information. Authentication and authorization are both key parts of this cycle.  Each aspect of the triad serves its individual purpose while also in conjunction with the others.

     

    Availability

    For any organization to function efficiently, data and information must be readily available to authorized individuals. Protections must exist to safeguard this information, especially for an organization such as the CIA which deals with information deemed harmful to national security if mishandled. To access this information, Authentication then authorization must take place. 2 factor authentication has become standard practice. Among government and intelligence organizations, often an individual will need a token or keycard along with accompanying password to gain authorization.

     

    Integrity

    Integrity can be defined, in this case, as the reliability of the data to be accurate. In order to ensure integrity, authentication and authorization come into play yet again. As previously discussed, authorization can only be granted to those who have been authenticated. Beyond that, files and data may be available in a limited form to those who have been granted access. An easy example of this is the read only function of Microsoft word. While some individuals may need access to data, they may also no be able to alter it. This can ensure data integrity from accidental or malicious manipulation.

     

    Confidentiality

    “Confidentiality is a set of rules that limits access to information”. (Chai) Data/files are often organized by the level of damage they can inflict if accessed by unauthorized parties. For example, some parties who are authorized to access information deemed secret may not have access to information deemed top secret. This added level of protection is applied with the goal of safeguarding information more stringently based on how sensitive it is.

     

    Conclusion

    Authentication and authorization play key roles through all three phases of the CIA’s AIC triad. It is important that authorized parties have quick access to data. It is crucial that the confidentiality and amount of access given is appropriate and the integrity of that data must also be trusted.

     

     

     

     

     

     

    Sources

    1. “Authentication vs. authorization.” Microsoft identity platform – Microsoft Learn, Microsoft, 21 Mar. 2025, https://learn.microsoft.com/en-us/entra/identity-platform/authentication-vs-authorization. Accessed 8 Feb. 2026
    2. Chai, W. What Is the CIA Triad? Definition, Explanation, Examples. TechTarget, 28 June 2022, https://drive.google.com/file/d/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l/view?usp=sharing. Accessed 8 Feb. 2026.

Detailed Knowledge of Key Technologies

  • Through my professional experience and now academic study, I am developing skills related to several key technologies used in modern IT and cybersecurity environments.

    My experience managing operational equipment, communications equipment, and mission planning tools has required an understanding of how interconnected systems function in real-world conditions.

    Areas of developing expertise include:

  • Linux operating systems
  • Microsoft operating environments
  • networking fundamentals
  • cybersecurity awareness
  • system security procedures
  • physical security and operational risk management