Hackers don’t wait—neither should you.
Multi-Factor Authentication (MFA): “Implementing MFA can prevent 99.9% of automated cyberattacks. Simple steps, powerful results.”
Human Error: “Did you know that 95% of cybersecurity breaches are caused by human error? Awareness and training are critical to protecting businesses.”
Cyber Hygiene: “Think of your digital life like your health; regular check-ups and clean-ups can prevent disaster.”
Click wisely; think twice, act secure.
CYSE 368 - Cybersecurity Internship
This course allows students to volunteer to work in an agency or company related to cybersecurity. Students must volunteer for 50 hours per course credit and complete course assignments.
This course requires that an individual to already have an active internship and the assignments are based on his or her existing internship experience. I elected to do the 6 credit course load due to the length and schedule at my internship this semester.
Impact of Cybersecurity
The advancement of technology has guaranteed that it plays a significant role in our lives. We utilize it throughout the day as part of our everyday routine. This phenomenon demonstrates our reliance on ever-strengthened technology. Moreover, the digital revolution has transformed and continues to affect the world and our lives. Even though technological improvements have a positive impact on our lives, there is overwhelming evidence that digital technology might have a harmful impact on human behavior, ethics, and small businesses.
Human Behavior: Cyber Stalking/Cyber Harassment
According to Hazelwood and Magnin (2013), cyber stalking and cyber harassment have become widespread issues that demand criminologists’ and criminal justice experts’ attention. Although there are no nationwide assessments of the scope and pervasiveness of these crimes, research of various towns and universities raises concerns. The Department of Justice (1999) estimated that roughly 20% of stalking cases in Los Angeles and 40% of stalking cases in New York used the Internet as the medium for this criminal conduct in a discussion of the scope of cyber stalking. According to recent research, over 40% of college students have experienced cyberstalking at some time in their life (Reyns et al., 2012). Based on these figures, as well as the rising usage and availability of electronic gadgets, I think it is apparent that cyberstalking and cyber harassment deserve the criminal justice system’s attention.
Cyber Harassment (CH)
Cyber harassment entails tormenting, annoyance, terrorizing, offending, or threatening an individual over email, instant chat, or other means with the purpose of injuring that person. Harassing communications includes all aspects of conventional harassment, but also includes the use of technological devices to send messages that make a person feel personally targeted for damage. Creating a Facebook account in someone else’s name and using that profile to insult others is an example of CH. Additional instances of CH include sending improper text messages (e.g., of a frightening or sexual nature) or building a website with photo-shopped photographs of an uninformed individual engaged in sexual actions (Hazelwood & Magnin, 2013).
Cyber Stalking (CS)
Cyberstalking is defined as “the repeated pursuit of an individual utilizing electronic or Internet-capable devices” in its simplest form (Reyns et al., 2012, p. 1). Any unsolicited electronic messages that are threatening, coercive, or frightening are considered repeated pursues. In the end, stalking is a crime that causes the victim to feel dread, terror, intimidation, tension, or worry. The victim may lose a sense of control over his or her own life as a result of the stalker’s repeated nature, as the victim never knows when the stalker may emerge or contact him or her again. The stalker’s ability to access the victim at any time and from any distance undermines the victim’s feeling of security and can lead to a perpetual state of terror (Hazelwood & Magnin, 2013).
CYSE 368
Empowering Communities and Enhancing Cybersecurity Awareness
The CYSE 368 Cybersecurity Internship provided a transformative experience that bridged academic knowledge with practical application. As an intern at the Brooks Crossing Innovation and Opportunity Center, I had the unique opportunity to collaborate on initiatives that not only strengthened my understanding of cybersecurity but also made a tangible impact on the community. By working with individuals of all ages, from K–12 students to community members, I developed a comprehensive perspective on cybersecurity’s importance in today’s interconnected world.
Key Experiences
Engaging K–12 Students in Cybersecurity Education
Building on my role at the Brooks Crossing Innovation Lab, I taught hands-on sessions designed to introduce K–12 students to the fundamentals of cybersecurity. Using interactive tools and relatable examples, I demonstrated how everyday activities, such as creating passwords and avoiding suspicious links, contribute to digital safety. These sessions were designed to:
Spark interest in technology and cybersecurity careers.
Empower students with skills to protect themselves online.
Highlight the societal impact of cybersecurity practices.
Real-World Challenges in Cybersecurity
Human Factors and Cyber Awareness
Human error is one of the most significant contributors to cybersecurity breaches. During my internship, I observed how simple mistakes, such as weak passwords or clicking on malicious links, can compromise entire systems. I focused on:
- Creating educational materials to increase awareness of these risks.
- Collaborating with teams to design simulations that train employees to detect phishing attempts.
-
IoT Vulnerabilities
As the number of IoT devices continues to grow, so do the risks they pose. My work included identifying potential security gaps in IoT systems and educating users about safe practices, such as changing default passwords and updating device firmware.
Empowering Underserved Communities
By combining my cybersecurity expertise with outreach efforts, I contributed to bridging the knowledge gap in underserved communities. This aligns with my broader goal of using technology to create accessible and inclusive solutions that protect businesses and individuals alike.
Conclusion
The CYSE 368 Cybersecurity Internship was an invaluable opportunity to translate academic theory into real-world practice. It reinforced my passion for cybersecurity education, innovation, and advocacy. Whether it was teaching students about online safety or helping small businesses fortify their defenses, the internship underscored the critical role cybersecurity plays in today’s world. As I continue my journey in cybersecurity, I am committed to applying these lessons to empower others and contribute to a safer digital future.
Stay connected.
Welcome to a platform where cybersecurity becomes more than a skill—it's a passion. Let's embark on this transformative journey together. Welcome aboard, Cyber Defender!