Reflection Two

Jan. 21th – Feb. 7th This week included a visit to the USS NITZE (DDG 94), a guided-missile destroyer. I was lucky to see my older brother, Taequez, who is an ENSIGN onboard. This trip included an introduction to the Electronic Materials Officer, CHIEF WARRANT OFFICER (CWO3) Kennedy. Due to a lack of Security Clearance,…

Reflection Six

Mar. 28th – Apr. 1st Overall I enjoyed my internship, and in the final 50 hours, I was saddened that my time with the commanders had come to an end. I wished that I could have entended my internship, but the semester has ended. In conclusion, this internship allowed me to have multiple chances to…

Reflection Four

Mar 7th-Mar 14th This week the team and I were tasked with briefing Carrier Strike Group Two (CSGTWO) on their interoperability and poor Cyber scans. During this visit, I was able to help create an excel spreadsheet that showed the Carrier Strike Group assets scans. The team offered to assist in Unit level training to…

Reflection Three

Feb 28th-Mar 4th This week I was fortunate enough to interview Ms. Renne Farrow of the Defense Cyber Operations (DCO), at JOINT STAFF, Suffolk, VA. I did this in order to gain a better understanding of the contract field through a civilian eye. I wanted to weigh the pros and cons of each side of…

Reflection One

January 24th – Jan 31st My internship began with a meeting with Captain Dean Gayle, the Chief SFIO for NAVAL INFORMATION FORCES (NAVIFOR).  I was shown around the BLDG SP-367 on Norfolk Naval Base.  After receiving my desk I was introduced to the team.  I was informed that I would be working with the team…

Journal 13

DB 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The cyber policy regulates all aspects of digital data exchange, including the Internet, data privacy, and network usage. Cyber policies also tend to cover gaps in knowledge that we may have primarily because of how fast…

Journal 12

How does cyber technology impact interactions between offenders and victims? The internet in our current society is a dangerous place at a time, yet we store very sensitive data on it often. Because of this, the internet gives hackers and malicious actors plenty of opportunities to harm and take advantage of the internet. Cyber Stalking…

Journal 10

How do engineers make cyber networks safer?  Engineers make cyber networks safer by using engineering and computer science to understand issues. Cybersecurity engineers have many different labels, such as IT security engineers or data security engineers. No matter the label, these engineer’s roles are to troubleshoot, identify unauthorized access, and offer solutions regarding a companies’…

Journal 9

Describe three ways that computers have made the world safer and less safe. In our society, computers have now been ingrained into what we do and how we do tasks. Computers and technology, in general, make our society safer for all. However, for every benefit, we receive there is a disadvantage.  First, when talking about…