

{"id":7197,"date":"2023-06-05T03:24:44","date_gmt":"2023-06-05T03:24:44","guid":{"rendered":"https:\/\/lichangesummer.org\/2023\/?page_id=7197"},"modified":"2023-08-11T10:09:47","modified_gmt":"2023-08-11T10:09:47","slug":"cyberkdamm","status":"publish","type":"page","link":"https:\/\/lichangesummer.org\/2023\/cyberkdamm\/","title":{"rendered":"CyberKDamm"},"content":{"rendered":"<style type=\"text\/css\"><\/style>\r\n<div class=\"wp-block-cover is-light home-banner\" style=\"min-height: 50px;aspect-ratio:unset;\">\r\n<div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns home-banner-column is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column home-banner-left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 60%;\">\r\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-8322\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\" alt=\"\" \/><\/figure>\r\n\r\n\r\n\r\n<h2 id=\"h-student-name\" class=\"wp-block-heading has-text-color has-montserrat-font-family has-custom-font\" style=\"color: #8b2927; font-size: 51px; font-style: normal; font-weight: 500; font-family: Montserrat;\">Kaylene Damm<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns slider-1-block is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column slider-1-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<p class=\"has-text-color has-custom-lineheight\" style=\"color: #445aa3; font-size: 31px; line-height: 1;\"><em>Dallas Christian High School<\/em><br \/><em>Class of 2023<\/em><\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Received a thorough hands-on introduction to Linux and other cybersecurity software including WireShark.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Worked with global experts from various cybersecurity fields to learn advanced concepts including firewall establishment, CIA Triads, Threat Detection\/Analysis, Training Recommendations, and Legal Policies.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Created a cybersecurity protocol proposal for a growing company to best protect their client\u2019s data and personal information using network and physical security recommendations.<\/p>\r\n\r\n\r\n\r\n<p class=\"learn-more-button has-text-color\" style=\"color: #ffffff; font-size: 21px; font-style: normal; font-weight: 200;\"><strong><em>Learn more about Kaylene here.<\/em><\/strong><\/p>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"wp-block-columns slider-block is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column slider-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">Grace is excited to participate in the Cybersecurity Leadership Initiative Internship this summer. She is eager and ready to learn more about the intricate inner workings of security in the technological space.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">As a freshly graduated senior alumnus at Dallas Christian School, Grace is a hard-working and capable high honors student who has been a member of the National Honor Society and has gone the extra mile academically. She has been enrolled in Dual Credit courses since her freshman year, working and studying around the clock to get the best possible start to her college education. She is a dynamic problem solver, thinking outside the box and finding solutions in unconventional and unexpected ways. She is also a proficient artist, having utilized almost all forms of artistic media at least once, her favorite being traditional sketching and working with stained glass. She has been an artist since she was able to put pencil to paper. She is also a black belt in taekwondo, having won first place in several sparring matches.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">Grace is looking forward to studying Cybersecurity, and has been interested in this field since a young age. Helping others has always been her nature, and technology has always excited her. The Leadership Initiative Program has offered a fantastic opportunity for her to express her interest in this field, and she is ecstatic to pursue a career in Cybersecurity and Intelligence.<\/p>\r\n\r\n\r\n\r\n<p class=\"learn-more-button-neuro has-text-color\" style=\"color: #ffffff; font-size: 21px; font-style: normal; font-weight: 200;\"><strong><em>Read more about Kaylene&#8217;s achievements here.<\/em><\/strong><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column home-banner-right-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 40%;\">\r\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-7887\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0038_KDamm-Bio.png.png\" alt=\"\" \/><\/figure>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"wp-block-cover is-light my-neuroscience-training\" style=\"min-height:50px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-my-cybersecurity-training\" style=\"color:#445aa3;font-size:51px;font-style:normal;font-weight:600\">My Cybersecurity Training<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns my-neuroscience-training-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#about\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"365\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/security-highlight-1-min-1.png\" alt=\"\" class=\"wp-image-8462\" srcset=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/security-highlight-1-min-1.png 320w, https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/security-highlight-1-min-1-263x300.png 263w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#about\">Business<br> Collaboration<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#proposal\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"365\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/about-min.png\" alt=\"\" class=\"wp-image-8463\" srcset=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/about-min.png 320w, https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/about-min-263x300.png 263w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#proposal\">My Cybersecurity<br> Proposal<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#presentation\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"365\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/proposal.png\" alt=\"\" class=\"wp-image-8464\" srcset=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/proposal.png 320w, https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/proposal-263x300.png 263w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#presentation\">My Cybersecurity <br>Presentation<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#highlights\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"365\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/ethernet.png\" alt=\"\" class=\"wp-image-8465\" srcset=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/ethernet.png 320w, https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/ethernet-263x300.png 263w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#highlights\">Internship<br> Highlights<\/a><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-cover is-light business-partner-blocks\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"about\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-business-partner-overview\" style=\"color:#445aa3;font-size:51px;font-style:normal;font-weight:600\">Business Partner Overview<\/h2>\r\n\r\n\r\n  \r\n    <div class=\"main\">\r\n  <div class=\"slider slider-for-business-partner\">\r\n          <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/quick-facts-6.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>Quick Facts<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Nikki Hendricks Designs LLC strives to create eco-friendly pieces to create a more sustainable brand that will positively impact the world\u2019s current carbon footprint. Each piece of material used is locally sourced and eco-friendly. Her inspiration for each collection comes from cultural and social issues, creating a powerful and impactful story behind each piece of work.<\/p>\r\n\r\n<p>Working with brands and collaborating on ideas is a powerful part of having a successful brand. With every collection that Nikki drops, she aims to incorporate more eco-friendly materials and reach more with her goals and products. With that being said, the end goal is to use her clothing pieces to produce conversations on essential topics that need a change in the world.<\/p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0018_Nikki-3-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/about-the-owner-6.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>About the Owner<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>During Nikki Hendricks' time at the Maryland Institute College for the Arts, she displayed her eco-friendly designs at the college\u2019s spring show. At this show, she was scouted and launched her business and message. She has been invited to both the Milan and Paris Fashion Week.<\/p>\r\n\r\n<p>After graduating from MICA she continued to showcase her fashion lines at London and Romania's Fashion Weeks, as well as local shows in New York City, Washington, D.C., and Baltimore. During the pandemic, Nikki began creating masks for non-profits and incorporate more of her eco-friendly, wearable art into clothing collections.<\/p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0019_Nikki-4-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/about-the-business-6.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>About the Business<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>With Nikki\u2019s fashion being on the front covers of various magazines, Hendricks Designs flashes an impressive amount of media highlights. Beginning her first residency with DC Fashion Foundation from 2017-2019, Nikki\u2019s work would be featured on British Vogue, Harper\u2019s Bazaar Singapore, and Cosmopolitan Romania, as well as a mini-documentary on Zoomin TV.<\/p>\r\n\r\n<p>Hendricks Designs was incorporated by Nikki in 2017, shortly after she earned her degree at MICA. Of the fashion weeks her small business has participated in, many include those in Milan, Paris, London, and Romania. Hendrick\u2019s Designs\u2019 mission is to design a better future by drawing inspiration from the stories of marginalized people, moving towards sustainable practices and eco-friendly designs, and bringing communities together through collaborations with other businesses and art\u2019s rallying power for good.<\/p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0017_Nikki-2-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/vulnerabilities-6.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>Current Vulnerabilities<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Nikki Hendricks Designs has experienced previous hacking before. The owner\u2019s Instagram account was hacked into and caused the owner to get locked out. Many of the passwords of the accounts are similar which makes access to client information and products. These passwords are also shared with other people on her team and are not regularly changed to keep the data protected.<\/p>\r\n\r\n<p>All of Nikki Hendricks Designs' information is accessible through her devices such as her phone and laptop. If either of these were to be breached, all the data could be taken and would put both her company and clients in danger. The business\u2019 clients\u2019 personal identifiable information (PII) and credit card information is stored in her accounts and can be easily accessed if there were to be a leak.<\/p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0016_Nikki-1-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n       \t \r\n\r\n  <\/div>\r\n\t\t <div class=\"action slider slider-nav\">\r\n\t               <a data-slide=\"1\" class=\"\">Quick Facts<\/a>\r\n                <a data-slide=\"2\" class=\"\">About the Owner<\/a>\r\n                <a data-slide=\"3\" class=\"\">About the Business<\/a>\r\n                <a data-slide=\"4\" class=\"\">Current Vulnerabilities<\/a>\r\n          <\/div>\r\n<\/div>\r\n\r\n<link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.5.9\/slick.min.css\">\r\n    <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.5.9\/slick-theme.min.css\"> \r\n  <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/jquery\/3.6.0\/jquery.min.js\"><\/script>\r\n  <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.8.1\/slick.min.js\"><\/script>\r\n<script>\r\n\t\r\njQuery('.slider-for-business-partner').slick({\r\n   slidesToShow: 1,\r\n   slidesToScroll: 1,\r\n   arrows: true,\r\n\tspeed: 1000,\r\n\tfade: true,\r\n\tasNavFor: '.slider-nav'\r\n });\r\nlet slideCount = 4;\r\nlet slideShows;\r\nif(slideCount != '' ){\r\n    slideShows = slideCount;\r\n} else {\r\n    slideShows = 4\r\n}\r\njQuery('.slider-nav').slick({\r\n   slidesToShow: slideShows,\r\n   slidesToScroll: 1,\r\n   asNavFor: '.slider-for-business-partner',\r\n   dots: true,\r\n   focusOnSelect: true\r\n });\t\r\n<\/script>\r\n   \r\n  \r\n  \n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light my-research-proposal\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"proposal\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns my-research-proposal-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-research-proposal-left-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-left has-text-color\" id=\"h-my-securityproposal\" style=\"color:#3b5ea9;font-size:51px;font-style:normal;font-weight:600\">My Security<br>Proposal<\/h2>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our goals for our proposal were to address the main cyber security concerns of our partner business, as well as threats we identified through SWOT analysis and the CIA triad.<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our plan involves three main components: network upgrades, employee training, and compliance with National Institute of Standards and Technology (NIST) guidelines. Our solution implements network security systems and prepares employees to help protect Personally Identifiable Information (PII) from our partner\u2019s clients, reducing the risk of a data breach.\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our proposal was successfully granted, allowing us to implement our solution for our business. This will ensure that our partner is not at a high risk of Personally Identifiable Information (PII) or credit card information being stolen, protecting them for years to come.<\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-research-proposal-right-column is-layout-flow wp-block-column-is-layout-flow\">    <div class=\"wp-block-bplugins-custom-html\" id='bPluginsCustomHtml-1'>\n    <div class=\"my_research_proposal\">\n  <iframe loading=\"lazy\" src=\"https:\/\/drive.google.com\/file\/d\/1tbq_JUE3vz4JYVB7mdIEBqjILXvpvSq7\/preview\" width=\"640\" height=\"480\" allow=\"autoplay\" style=\"width: 100%; height: 100%;\"><\/iframe>\n<\/div>    <\/div>\n    <\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light my-research-proposal-presentation\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"presentation\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns my-research-proposal-presentation-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-research-proposal-presentation-left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:579px\">\r\n<figure class=\"wp-block-embed is-type-rich is-provider-embed-handler wp-block-embed-embed-handler wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\r\n<iframe loading=\"lazy\" title=\"2023 YDP Cybersecurity &amp; Defense: Nikki Hendricks Designs LLC Protocols for the Client\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/vEK0cMAqhIk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\r\n<\/div><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-research-proposal-presentation-right-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-left has-text-color\" id=\"h-my-securityproposalpresentation\" style=\"color:#3b5ea9;font-size:51px;font-style:normal;font-weight:600\">My Security<br>Proposal<br>Presentation<\/h2>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">During the Cybersecurity &#038; Defense Internship, I worked with Beth Cerrone and Jamie Kreider to learn about the basics of cybersecurity, and potential career pathways within it. \r\n<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Throughout the week, I worked with a company to develop cybersecurity solutions to protect against various cyber threats. I worked with my team to analyze the threats to the business, and then developed a comprehensive solution. At the end of the week, I presented my cybersecurity solution to a panel of three judges and received grant money to implement the solution.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light Internship-Highlights\" style=\"min-height:59px;aspect-ratio:unset;\" id=\"highlights\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-internship-highlights\" style=\"color:#3e5ba9;font-size:51px;font-style:normal;font-weight:600\">Internship Highlights<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tabs atbs__tabs_72c47f5a\"><ul class=\"atbs__tab-labels left make-active-tab-separate-less\" role=\"tablist\" aria-label=\"tabbed content\"><li class=\"atbs__tab-label active\" role=\"tab\" aria-selected=\"true\" aria-label=\"Security Site Tours\" tabindex=\"0\">Security Site Tours<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Business Partner Meeting\" tabindex=\"0\">Business Partner Meeting<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Working With Experts\" tabindex=\"0\">Working With Experts<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Cybersecurity Labs\" tabindex=\"0\">Cybersecurity Labs<\/li><\/ul><div class=\"atbs__tab-content\">\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Security Site Tours\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/SecurityTours.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I was given the unique opportunity to take exclusive tours of multiple government and security sites to speak directly with security professionals. During these tours, I was able to witness first-hand how cybersecurity operates at the national and international level. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">First, I received an exclusive tour of the United States Pentagon where I was able to view the interior of the Pentagon as well as see some of the different meeting rooms throughout the Department of Defense. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">We also toured the Department of Homeland Securities\u2019 Cybercrimes Center where we received classified tours of the cyber crimes unit of the DHS and learned how Homeland Security uses cyber intelligence to track major crimes such as drug smuggling, human trafficking, and major theft. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Business Partner Meeting\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0004_Nikki.png.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">In order to apply the skills I learned throughout the internship, I worked directly with an aspiring entrepreneur based in the Washington D.C. area to discuss their companies cybersecurity needs. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">After three meetings where I walked through the business model, protected information, and staff training of the companies, I worked with my team to create a staff training protocol and threat analysis for my business partner. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">At the end of the internship, I advocated for, and received funding for, my business partner to implement the cybersecurity training protocols so they can best protect their client information and continue to develop with a reduced fear of cyber attacks and cybersecurity threats. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Working With Experts\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/CyberSecExperts.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">To learn more about the world of cybersecurity, I was given the unique opportunity to speak directly with cybersecurity experts from multiple different organizations and backgrounds.<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I worked directly with one of the leading consultants in Cyber Threat Management, and a consultant for cyber policy for the National Counterintelligence Executive, Phuong Nguyen, to learn about common threat assessment and cybersecurity counterintelligence. I also heard from the global leader in Firewall Creation, David Balenson; the author of the most widely-regarded O\u2019Reilly book on cybersecurity, Michael Collins; and the lead SME for the FutureG Initiative for the Department of Defense. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">Throughout the internship, I also heard presentations from, and spoke with, representatives from the Department of Defense, Department of Homeland Security, and the National Security Agency. To learn the physical side of cybersecurity, we also had the unique opportunity to meet with globally-recognized penetration testers and network threat assessors. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Cybersecurity Labs\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/CyberLabs.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">In order to put the skills we learned to the test, I had the unique opportunity to use a cybersecurity software used for graduate instructional courses to learn a myriad of cybersecurity skills. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">Starting with network cybersecurity, I worked through labs dedicated to network security and linux to understand how networks communicate with each other and how cybersecurity poses a threat to this communication. I used these Linux skills to complete capture-the-flag coding competitions as well as virtual rooms. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">At the end of the internship, I worked with an expert from a leading cybersecurity consulting firm to learn how to built ethernet cables. I used ethernet cord, crimpers, and wire strippers to produce functioning ethernet cables. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n<\/div><\/div>\r\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"class_list":["post-7197","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyberKDamm - Leadership Initiatives<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lichangesummer.org\/2023\/cyberkdamm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberKDamm - Leadership Initiatives\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lichangesummer.org\/2023\/cyberkdamm\/\" \/>\n<meta property=\"og:site_name\" content=\"Leadership Initiatives\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-11T10:09:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"5 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/#website\",\"url\":\"https:\/\/lichangesummer.org\/2023\/\",\"name\":\"Leadership Initiatives\",\"description\":\"Programs That Inspire Students To Transform The World\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lichangesummer.org\/2023\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/cyberkdamm\/#primaryimage\",\"inLanguage\":\"en\",\"url\":\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\",\"width\":975,\"height\":240},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/cyberkdamm\/#webpage\",\"url\":\"https:\/\/lichangesummer.org\/2023\/cyberkdamm\/\",\"name\":\"CyberKDamm - Leadership Initiatives\",\"isPartOf\":{\"@id\":\"https:\/\/lichangesummer.org\/2023\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lichangesummer.org\/2023\/cyberkdamm\/#primaryimage\"},\"datePublished\":\"2023-06-05T03:24:44+00:00\",\"dateModified\":\"2023-08-11T10:09:47+00:00\",\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lichangesummer.org\/2023\/cyberkdamm\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/7197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/comments?post=7197"}],"version-history":[{"count":2,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/7197\/revisions"}],"predecessor-version":[{"id":11600,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/7197\/revisions\/11600"}],"wp:attachment":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/media?parent=7197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}