{"id":218,"date":"2023-09-21T18:09:09","date_gmt":"2023-09-21T18:09:09","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2024-12-01T01:31:50","modified_gmt":"2024-12-01T01:31:50","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Analytical and Critical Thinking Skills<\/strong>:<\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><br>I have developed an ability to analyze complex cybersecurity problems and provide detailed solutions. This skill is essential for evaluating risks, identifying vulnerabilities, and recommending strategies to mitigate threats.<\/p>\n<\/div><\/div>\n\n\n\n<ul>\n<li>Demonstrated critical and analytical thinking by conducting a comprehensive risk assessment of the City of Suffolk\u2019s SQL database, identifying vulnerabilities and recommending strategies to mitigate risks such as weak passwords, outdated security patches, and other security gaps.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/Copy-of-Suffolk-Team-A_B-Presentation-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Copy-of-Suffolk-Team-A_B-Presentation-1.\"><\/object><a id=\"wp-block-file--media-e1c2e5bc-8c78-4093-bb1c-40d67e33a6c5\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/Copy-of-Suffolk-Team-A_B-Presentation-1.pdf\">Copy-of-Suffolk-Team-A_B-Presentation-1<\/a><\/div>\n\n\n\n<ul>\n<li>Ability to identify and evaluate security threats in network traffic, system vulnerabilities, and incident scenarios.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/LabLogAnalysis.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of LabLogAnalysis.\"><\/object><a id=\"wp-block-file--media-eeed47cb-acad-4bb0-b572-1261ed58f3f4\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/LabLogAnalysis.pdf\">LabLogAnalysis<\/a><\/div>\n\n\n\n<ul>\n<li>Critical thinking applied to evaluating the impacts of security breaches like the WannaCry ransomware attack and recommending effective solutions.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/WannaCry.Research-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WannaCry.Research-Paper.\"><\/object><a id=\"wp-block-file--media-002ce071-3d1d-4796-a5fe-7d475eac55bb\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/WannaCry.Research-Paper.pdf\">WannaCry.Research-Paper<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Technical Proficiency in Cybersecurity Tools<\/strong>:<\/h2>\n\n\n\n<p><br>I possess the technical skills in utilizing cybersecurity tools for risk assessments, network analysis, and incident detection. This includes hands-on experience with platforms such as Tenable.io and Wireshark, as well as Python for network communication.<\/p>\n\n\n\n<ul>\n<li>Conducted risk assessments using Tenable.io, evaluating system vulnerabilities and recommending mitigation strategies.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/TenableScanArtifact.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of TenableScanArtifact.\"><\/object><a id=\"wp-block-file--media-20a03abf-4f6f-4373-ae9a-823da15dc529\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/TenableScanArtifact.pdf\">TenableScanArtifact<\/a><\/div>\n\n\n\n<ul>\n<li>Performed network traffic analysis with Wireshark to identify potential security threats and anomalies.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/Wireshark-Demonstration-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Wireshark-Demonstration-2.\"><\/object><a id=\"wp-block-file--media-c8fde053-8c38-442b-b6c9-d2d74f6201e9\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/Wireshark-Demonstration-2.pdf\">Wireshark-Demonstration-2<\/a><\/div>\n\n\n\n<ul>\n<li>Developed a client-server communication system using Python and socket programming to showcase networking protocols and secure data transmission.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/SocketProgrammingCode.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SocketProgrammingCode.\"><\/object><a id=\"wp-block-file--media-3f8cf8cf-cfc7-4650-a892-5192393b939c\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/SocketProgrammingCode.pdf\">SocketProgrammingCode<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Knowledge of Legal and Ethical Considerations in Cybersecurity<\/strong>:<\/h2>\n\n\n\n<p><br>My understanding of legal and ethical frameworks allows me to navigate the complex balance between privacy, security, and regulatory compliance in cybersecurity practices.<\/p>\n\n\n\n<ul>\n<li>Applied ethical theories to real-world cybersecurity scenarios, analyzing the impact of misinformation in the 2016 U.S. election.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/CA-Information-Warfare.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CA-Information-Warfare.\"><\/object><a id=\"wp-block-file--media-cb2326f4-6169-4991-a37f-9c54e90007aa\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/CA-Information-Warfare.pdf\">CA-Information-Warfare<\/a><\/div>\n\n\n\n<ul>\n<li>Completed case studies on GDPR and CCPA, assessing legal frameworks for data protection and cybersecurity practices.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/CA-Data-Ethics-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CA-Data-Ethics-1.\"><\/object><a id=\"wp-block-file--media-1af1b5b6-0b06-4520-a805-da875a524622\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/CA-Data-Ethics-1.pdf\">CA-Data-Ethics-1<\/a><\/div>\n\n\n\n<ul>\n<li>Evaluated the ethical implications of security decisions and their potential societal consequences, highlighting responsible and lawful cybersecurity practices.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/CA-4-Professional-Ethics.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CA-4-Professional-Ethics.\"><\/object><a id=\"wp-block-file--media-0ec79bc6-5b8a-44b9-a083-9ad38611080c\" href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-content\/uploads\/sites\/34291\/2024\/11\/CA-4-Professional-Ethics.pdf\">CA-4-Professional-Ethics<\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analytical and Critical Thinking Skills: I have developed an ability to analyze complex cybersecurity problems and provide detailed solutions. This skill is essential for evaluating risks, identifying vulnerabilities, and recommending strategies to mitigate threats. Technical Proficiency in Cybersecurity Tools: I possess the technical skills in utilizing cybersecurity tools for risk assessments, network analysis, and incident&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rebeccarhight\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27550,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-json\/wp\/v2\/users\/27550"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":430,"href":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-json\/wp\/v2\/pages\/218\/revisions\/430"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rebeccarhight\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}