Shauntell Gavino-Collins Reflection Paper #1 09/08/25 Cavalier Logistics ODU Fall 2025 Professor Teresa Duvall Internship Reflection Paper First 2 Weeks/50 hours Working as a Network Security Intern for Cavalier Logistics for my first 50 hours has given me the opportunity to apply what I have learned so far from ODU and get hands-on experience and…
SCADA Systems: Mitigating Risks
Supervisory Control and Data Acquisition (SCADA) systems play a key role inoverseeing critical infrastructure systems and industrial processes remotely whichinclude (but are not limited to) water, wind, manufacturing, and power. SCADA systemswere created to make these operations more efficient, but without implementingnecessary updates and being outdated, this has caused an adverse effect. SCADA’s VulnerabilitiesSCADA systems…
DNA in the Digital Era: Genetic Vulnerabilities
The digitization of human DNA through direct-to-consumer (DTC) services introduces vastcybersecurity risks. DNA represents the most sensitive form of personally identifiableinformation (PII). Its increasing accessibility to cybercriminals expands the threat landscapeconsiderably and without urgent advancements in cyberbiosecurity, the potential for irreversiblebreaches of personal identity and violations of bioethical standards is inevitable. Security Risks of DNA…
How Has Cyber Technology Created Opportunities for Workplace Deviance?
The necessity of cyber technology and integration into the present workplace has improved how organizations communicate, increase their productivity, connect to information and the world. Although it has positive aspects, there are negative aspects that have been introduced through deviant behavior. Workplace deviance around cyber technology involves, but are not limited to cyberloafing, data theft/misuse,…
Ethical Considerations of CRISPR Gene Editing
Genetic data technology is on the rise, such as CRISPR, and it’s showing promise with making successful impacts when it comes to editing DNA, cures for genetic diseases, and more. Although gene editing has endless opportunities to be innovated or improved as a medical godsend, it could also be a horrific cyber weapon. As next-level…
A Foundational Framework: The CIA Triad
An integral foundational model in cybersecurity is known as The CIA Triad: Confidentiality, Integrity, and Availability are what protects sensitive information, ensures reliability, and provides access to the correct users. Understanding how the CIA Triad works in conjunction with authorization, which defines access privileges, and authentication, which confirms the identity of the user, is the…
Protecting Availability
As the Chief Information Security Officer (CISO) of a public traded company, there are protections I would implement to ensure availability of my systems. Maintaining steady availability is crucial not only because investors and clients rely on open access to the services that is being provided, but also because when a system is not available,…
Integrating IT into Diverse Components of a Business
Present-day businesses rely on more than just core departments; they require seamless cross-collaboration across every function, with IT playing an analytical and vital role. Integrating IT into all diverse components of the business enhances performance, refines security, and builds a foundation for sustained growth. Comprehending Business Components There are various components in a thriving business…
The Unlimited Potential of the NIST Cybersecurity Framework for Organizations
Cybersecurity around the globe depends on incredibly important infrastructure and cybersecurity threats have been a constant issue that can be lethal because it can destabilize important aspects of a nation such as a Nation’s security, critical procedures, sensitive information, the health of citizens, and so much more. In the United States, The Cybersecurity Enhancement Act…