IDS 493

I have developed intellectually, professionally, and emotionally during my cybersecurity major in ways I did not anticipate when I started this degree. Before enrolling in the program, my understanding of cybersecurity was primarily technical, focusing on networks, firewalls, cryptography, and threat prevention. However, the more classes I completed, the more I realized how truly multidisciplinary the profession is. Cybersecurity encompasses not just technology but also writing, research, human rights awareness, critical thinking, communication, law, ethics, and teamwork. My program’s tasks have forced me to look beyond the obvious and develop my ability to explain cyber ideas to both technical and non-technical audiences. By creating an ePortfolio, I’ve been able to analyze my own work, pinpoint my areas of strength, and see how each item reflects aspects of my future self as a cybersecurity expert.

This reflection essay examines four fundamental abilities: technical writing, presentations, interdisciplinary research, and critical thinking that have greatly improved over my academic career. I’ve picked artifacts that best illustrate my development and practical learning for each skill. Gathering and evaluating these projects made me consider my development, the knowledge underlying each task, and the amount of time I put into creating worthwhile work. One of the hardest and most satisfying aspects of the process was creating this ePortfolio. Instead of just doing homework, I learned how to curate my successes. Even though I’m still figuring out what particular cybersecurity job route I might take, when I think back on each item, I see more than simply the tasks I finished; I see the abilities that prepared me for the working world.

One of the most useful talents I have acquired in this program is technical writing. Information must be conveyed precisely, concisely, and clearly in cybersecurity. A well-written report can influence policy choices, clarify hazards, or translate very complex dangers for the public or management. I eventually developed my ability to organize research papers, evaluate difficult subjects, and clearly and purposefully communicate results. My research on Trusted Execution Environments, my analysis of election security, and my study on cybersecurity and human rights serve as examples of this.

My paper on Trusted Execution Environments improved my comprehension of hardware-based security architecture, especially ARM TrustZone and Intel SGX. Learning new vocabulary and converting complex ideas into understandable explanations were necessary for this paper. I had to learn about the function of isolated execution, how secure enclaves operate, and the weaknesses that side-channel attacks take advantage of. I recall having trouble at first since the technology was complicated, but I eventually learned how to describe TEEs in a way that other people could comprehend by drafting and revising. This essay reflects my process of learning how to write in a way that is both accessible and technically complex.

Because my Election Security assessment paper called for both analysis and arguments, it tested my technical writing abilities. I assessed the security of ballot marking equipment, voter infrastructure, audit processes, and possible hazards rather than just describing technology. I was able to think like an analyst thanks to this work, seeing flaws, ramifications, and practical effects. I also have to think about policy choices, digital integrity, and public trust. This project taught me that technical writing is more than just expressing facts; it also entails evaluating the significance of that data to society.

My writing viewpoint has been expanded by my study of cybersecurity and human rights. The human rights to privacy, freedom of speech, and online safety were all linked to digital security in this article. I included the topic of elder fraud and cyber awareness, which made me realize how vulnerable groups are directly impacted by cybersecurity flaws. Writing on human rights made me think about the ethical and social obligations of technology. It demonstrated to me that writing can be effective when used to promote awareness and protection because it was the first time I had coupled cybersecurity with humanitarian concern.

Collectively, these artifacts show how my identity as a cybersecurity student was shaped by technical writing. I gained the ability to properly arrange data, provide evidence to back up assertions, and clearly explain technical concepts. More significantly, I found that one of my best academic skills is writing, which I can apply to any potential professional path I choose.

Whether presenting project results, briefing a team, or educating the public, communication is crucial in cybersecurity. I finished PowerPoints, peer feedback sessions, and class presentations during my schoolwork, all of which increased my self-assurance and comfort level while speaking in front of an audience. When I initially started giving presentations, I was anxious and paid more attention to the slides than to my delivery. But as time went on, I developed my ability to interact with my audience, make things easier to understand visually, and talk with greater assurance.

I learned how to organize material graphically and convey it in a step-by-step manner via my PowerPoint assignments. I discovered how understanding is impacted by color, layout, and slide pace. Overcrowding presentations with too much text was one of my early challenges. I discovered through experience that presentations with clear, concise slides and spoken explanations work better than those with a lot of text. Instead of replacing my stated remarks, I now create slides that emphasize important concepts.

I was able to improve my communication abilities by getting helpful criticism from others during class presentations and peer reviews. I was able to practice summarizing complex subjects in brief and responding to inquiries on the spot by presenting my study. I learned how to evaluate other people’s presenting styles through peer assessments and determine what aspects—such as tone, tempo, confidence, visual design, or audience connection work effectively. I started focusing on the content’s transitions between themes, body language, and intelligibility. With time, I discovered that giving a presentation seemed less daunting and more like sharing something worthwhile that I had put a lot of effort into.

Presentations improved leadership preparedness as well as communication. Whether I work in incident response, policy, awareness training, analysis, or GRC, I know that effective communication will be crucial, even if I may not yet know precisely which cybersecurity profession I desire. I learned how to speak up, swiftly arrange my ideas, and properly communicate my knowledge through presentations—skills that will benefit me in my future career.

Law, ethics, sociology, psychology, politics, and international human rights are all intertwined with cybersecurity. My multidisciplinary development is demonstrated by my work on WiCyS, my paper on cybersecurity and human rights, and my report on recent cyberattacks. For these efforts, it was necessary to look at cybersecurity from a non-technical perspective, including human behavior, policy effects, and global threat landscapes.

My professional awareness was increased by taking part in WiCyS programs. I was introduced to networking, mentorship, a variety of viewpoints, and the empowering of women in technology via participating in cybersecurity communities. It demonstrated to me the importance of representation in cybersecurity settings and what real-world teamwork looks like. Meetings, conversations, and events taught me that collective knowledge, not individual effort, is the foundation of cybersecurity. One of my first encounters with interdisciplinary learning where technology and community come together was this event.

My article on cybersecurity and human rights was a comprehensive, multidisciplinary study that linked ethical duty with digital safety. It examined how privacy, surveillance issues, and vulnerable populations—like the elderly, who are frequently the victims

 of internet scams—are impacted by cyber dangers. I discovered that cybersecurity experts need to think about who is affected when security fails in addition to how to safeguard systems. I learned empathy, awareness, and the value of community education from this project.

My ability to do research, examine an event chronology, and comprehend the progression of a breach was enhanced by the Recent Cyber Attack report. I assessed the assault technique, exploited weaknesses, repercussions, and social impact. This exercise improved my comprehension of actual threat behavior and demonstrated to me that cybersecurity involves not just technical expertise but also investigative thinking, risk awareness, and historical awareness.

When taken as a whole, these artifacts show how multidisciplinary education influenced my viewpoint. I now see cybersecurity as a field requiring ethics, communication, awareness, research, and human understanding in addition to being a technological profession.

One of the most crucial abilities I acquired while studying was critical thinking. I gained the ability to challenge facts, assess risk, contrast viewpoints, and solve issues rationally. This development is reflected in my analysis of Microsoft phishing attempts and appraisal of election security.

I had to examine voting technologies, pinpoint flaws, and suggest fixes as part of the Election Security assessment. It necessitated critical consideration, investigation, and the capacity to assess procedures rather than take them at face value. Because election security contains legal, social, and technical aspects that need to be properly balanced, this task improved my analytical reasoning. It forced me to think about dangers from a variety of perspectives, including national stability, public trust, disinformation hazards, and technology weaknesses.

I assessed how phishing efforts employ deception, urgency, and human psychology to trick consumers in the Microsoft phishing analysis. Because phishing focuses more on taking advantage of individuals than on system faults, this project improved my critical thinking skills. I had to examine the reasons behind assaults’ success as well as risk-reduction tactics. I was able to understand the human aspect of social engineering defenses, behavioral reactions, and cybersecurity awareness training thanks to this project.

These artifacts demonstrate my capacity for independent thought, issue interpretation, and solution evaluation. I now use critical thinking in regular internet interactions, research, and courses.

I became aware of my own development while gathering artifacts for this ePortfolio. Building the ePortfolio itself was one of the challenges I conquered; it took time, ingenuity, and organization. I was initially overwhelmed by the task of determining what work belonged here. I eventually figured out how to portray myself professionally and highlight my best work. After finishing this portfolio, I felt more assured about my academic achievements.

I was quite aback by how multidisciplinary cybersecurity actually is. I now realize that cybersecurity encompasses research, communication, ethics, and public protection in addition to coding and network defense. This ePortfolio, which graphically depicts my educational experience, is the product of which I am most proud. It displays not only my accomplishments but also my future self.

Even though I haven’t decided on a career path yet, I am confident that my classes have strengthened my writing, time management, research depth, presenting confidence, and problem-solving approach, all of which have prepared me for professional situations. I learned how to tackle cybersecurity with consideration and responsibility, and I will continue to do so.

I was able to see myself more clearly as a student and potential professional as a result of this reflection. Strong technical writing, developing presenting confidence, multidisciplinary understanding, and careful critical thinking are all evident in my work. Even though I’m still figuring out what path I want to follow in cybersecurity, these abilities form the cornerstone of my academic identity and position me for prospects. My degree has taught me that cybersecurity encompasses more than just technology; it also involves human effect, communication, research, and accountability. I was able to see how much I have learnt by creating my ePortfolio, which motivates me to keep improving my abilities going forward.