Mar 7th-Mar 14th
This week the team and I were tasked with briefing Carrier Strike Group Two (CSGTWO) on their interoperability and poor Cyber scans. During this visit, I was able to help create an excel spreadsheet that showed the Carrier Strike Group assets scans. The team offered to assist in Unit level training to increase scan scores. I learned that for any network the scan process involves a scan patch scan process. Once a scan is completed, a list of vulnerabilities in the assets scanned is created. It then becomes imperative that the vulnerabilities are remediated and corrected. Once corrections are administered the network must be scanned again. If the administrator has done their job then there should be zero vulnerabilities.
During my visit to Carrier Strike Group Two (CSG2) I was able to interview, LCDR Iris Wood. LCDR Wood is the Communications and C5I Officer for CSG2. LCDR Wood is designated as Navy Information Professional (IP) Officer. Her certifications include CISSP (Certified Information Systems Security Professional). We discussed the growing field of Cybersecurity and the many job opportunities available. As a United States Naval Academy Graduate (USNA) LCDR Wood chose the IP field because of her love of coding. She stated that computers have always been her hobby. I was excited to hear that Women in CYBER, along with other groups on Linkedin are open to joining. Since this conversation, I have joined Women in Cyber and completed many Linkedin courses including the following: IT Security Foundations; and Cybersecurity Foundations.
Another concept touched upon is firewalls and routers. There are mainly five different types of firewalls that use different mechanisms to identify and filter out malicious traffic. Actually, there are many other types of firewalls; however, it narrows down to their functions and structures. The five different types are packet filtering firewall, circuit-level gateway,application-level gateway or proxy firewall, stateful inspection firewall, and finally, next-generation firewall. Next, we covered HBSS and ACAS, which are Host-Based Security systems and Assured Compliance Assessment solutions. After this, we learned about DOD infrastructure and cyber defense communication. Then the concepts of ransomware and zero-day attacks were studied. As well as PKI which stands for public key infrastructure. PKI is everything used to establish and manage public-key encryption.