

{"id":7218,"date":"2023-06-05T03:38:07","date_gmt":"2023-06-05T03:38:07","guid":{"rendered":"https:\/\/lichangesummer.org\/2023\/?page_id=7218"},"modified":"2023-08-11T10:18:29","modified_gmt":"2023-08-11T10:18:29","slug":"cybermruschel","status":"publish","type":"page","link":"https:\/\/lichangesummer.org\/2023\/cybermruschel\/","title":{"rendered":"CyberMRuschel"},"content":{"rendered":"<style type=\"text\/css\"><\/style>\r\n<div class=\"wp-block-cover is-light home-banner\" style=\"min-height: 50px;aspect-ratio:unset;\">\r\n<div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns home-banner-column is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column home-banner-left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 60%;\">\r\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-8322\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\" alt=\"\" \/><\/figure>\r\n\r\n\r\n\r\n<h2 id=\"h-student-name\" class=\"wp-block-heading has-text-color has-montserrat-font-family has-custom-font\" style=\"color: #8b2927; font-size: 51px; font-style: normal; font-weight: 500; font-family: Montserrat;\">Marina Ruschel<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns slider-1-block is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column slider-1-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<p class=\"has-text-color has-custom-lineheight\" style=\"color: #445aa3; font-size: 31px; line-height: 1;\"><em>DC International<\/em><br \/><em>Class of 2026<\/em><\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Received a thorough hands-on introduction to Linux and other cybersecurity software including WireShark.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Worked with global experts from various cybersecurity fields to learn advanced concepts including firewall establishment, CIA Triads, Threat Detection\/Analysis, Training Recommendations, and Legal Policies.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Created a cybersecurity protocol proposal for a growing company to best protect their client\u2019s data and personal information using network and physical security recommendations.<\/p>\r\n\r\n\r\n\r\n<p class=\"learn-more-button has-text-color\" style=\"color: #ffffff; font-size: 21px; font-style: normal; font-weight: 200;\"><strong><em>Learn more about Marina here.<\/em><\/strong><\/p>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"wp-block-columns slider-block is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column slider-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">Marina Ruschel is excited to be participating in the Cybersecurity &#038; Intelligence Internship this summer. She can&#8217;t wait to learn more about cybersecurity and what a career in cybersecurity would look like for her. She is also very excited to meet what kind of people are in this field and what kind of people are interested in this field.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">As a rising sophomore at DC international school, Marina has actively gotten the principles to list every quarter (grade average of 5.5+ in IB grading) and will be taking the highest level of Spanish DCI offers next school year. Marina is also proud of her extracurricular activities, she is part of the multi-media club a club that focuses on creating school spirit, she mentors a robotics team in VEX IQ her team was able to make it to the 2023 world championships this year, she is part of CAP (civil air patrol), she regularly volunteers at her school&#8217;s tech desk helping repair computers and has also been fencing for about 2 and half years now.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">In the future, Marina would like to study cyber security\/IT or marine biology. Her interest in Cybersecurity started when she got the offer for the internship and her interest in IT started when she started helping repair computers in 6th grade at her school&#8217;s tech desk. Her interest in Marine biology comes from her mother&#8217;s love and interest in it she wants to explore a career path her mom wasn&#8217;t able to study because of the limited resources she had growing up. Marina aspires to learn more about both career options and what they bring to the table before making a decision on what she wants to pursue. Fencing is also a big part of Marina&#8217;s life and she hopes to better herself in this sport and continue it after high school.<\/p>\r\n\r\n\r\n\r\n<p class=\"learn-more-button-neuro has-text-color\" style=\"color: #ffffff; font-size: 21px; font-style: normal; font-weight: 200;\"><strong><em>Read more about Marina&#8217;s achievements here.<\/em><\/strong><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column home-banner-right-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 40%;\">\r\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-7887\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0048_MRuschel-Bio.png.png\" alt=\"\" \/><\/figure>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"wp-block-cover is-light my-neuroscience-training\" style=\"min-height:50px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-my-cybersecurity-training\" style=\"color:#445aa3;font-size:51px;font-style:normal;font-weight:600\">My Cybersecurity Training<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns my-neuroscience-training-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#about\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/security-highlight-1-min-1.png\" alt=\"\" class=\"wp-image-8462\"\/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#about\">Business<br> Collaboration<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#proposal\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/about-min.png\" alt=\"\" class=\"wp-image-8463\"\/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#proposal\">My Cybersecurity<br> Proposal<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#presentation\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/proposal.png\" alt=\"\" class=\"wp-image-8464\"\/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#presentation\">My Cybersecurity <br>Presentation<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#highlights\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/ethernet.png\" alt=\"\" class=\"wp-image-8465\"\/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#highlights\">Internship<br> Highlights<\/a><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-cover is-light business-partner-blocks\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"about\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-business-partner-overview\" style=\"color:#445aa3;font-size:51px;font-style:normal;font-weight:600\">Business Partner Overview<\/h2>\r\n\r\n\r\n  \r\n    <div class=\"main\">\r\n  <div class=\"slider slider-for-business-partner\">\r\n          <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/vulnerabilities-3.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>Quick Facts<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Many Americans experience mental health and struggle to find solutions due to the stigma surrounding the issue. Healthy Right is a youth-led, non-profit organization that aims to improve mental health in communities in New Jersey and Washington, D.C. The organization works to bring awareness by advocating for legislation.<\/p>\r\n\r\n<p>Healthy Right strives to reform healthcare and mobilize communities by recruiting young people to create events, host programs, and support other organizations that promote the health of teens and children. The organization has had immense success in implementing many programs and events such as Mental Health Boxes during the COVID-19 pandemic, Quarantine Zoom Meetings to improve mental health from the safety of patients\u2019 homes, and Mental Health Discussions at Dover Library.<\/p>\r\n                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0008_Healthy-1-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/about-the-business-3.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>About the Owner<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Anisah Daniel started Healthy Right at 16 years old after personal struggles with mental health. She realized that other members of her community were uneducated on different mental illnesses or resources to improve their mental health. She took action and launched Healthy Right. Apart from running the organization itself, many bills have been introduced into the House of Representatives and Senate through Healthy Right.<\/p>\r\n\r\n<p>Although the nonprofit now has new leaders, Anisah plays a significant role in the organization by training new board members, making decisions on important issues, and playing her part in improving the mental health of different communities. She currently studies Neuroscience at George Washington University.<\/p>\r\n                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0009_Healthy-2-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/about-the-owner-3.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>About the Business<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Healthy Right is based in Morris County, New Jersey but their legislation efforts extend to Washington, D.C. The organization is led by about 10 youth and serves over 60 different members of the community.<\/p>\r\n\r\n<p>The nonprofit constantly holds community meetings and attends fairs to spread its message of destigmatizing mental illnesses. Healthy Right aims to reduce stigma so people feel more comfortable seeking help when needed by providing educational opportunities where community members can learn how to address mental illness.<\/p>\r\n                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0010_Healthy-3-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/quick-facts-3.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>Current Vulnerabilities<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <\/p>Healthy Right has experienced phishing attacks in the form of unmarked and false emails. These emails have caused their systems to fail. Due to being a fairly new and small business, the organization does not have the proper training to protect all its data from these attacks.<\/p>\r\n\r\n<p>Employees have not received training on what to look out for in terms of attacks, making the company even more susceptible to breaches.<\/p> \r\n\r\n                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0011_Healthy-4-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n       \t \r\n\r\n  <\/div>\r\n\t\t <div class=\"action slider slider-nav\">\r\n\t               <a data-slide=\"1\" class=\"\">Quick Facts<\/a>\r\n                <a data-slide=\"2\" class=\"\">About the Owner<\/a>\r\n                <a data-slide=\"3\" class=\"\">About the Business<\/a>\r\n                <a data-slide=\"4\" class=\"\">Current Vulnerabilities<\/a>\r\n          <\/div>\r\n<\/div>\r\n\r\n<link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.5.9\/slick.min.css\">\r\n    <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.5.9\/slick-theme.min.css\"> \r\n  <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/jquery\/3.6.0\/jquery.min.js\"><\/script>\r\n  <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.8.1\/slick.min.js\"><\/script>\r\n<script>\r\n\t\r\njQuery('.slider-for-business-partner').slick({\r\n   slidesToShow: 1,\r\n   slidesToScroll: 1,\r\n   arrows: true,\r\n\tspeed: 1000,\r\n\tfade: true,\r\n\tasNavFor: '.slider-nav'\r\n });\r\nlet slideCount = 4;\r\nlet slideShows;\r\nif(slideCount != '' ){\r\n    slideShows = slideCount;\r\n} else {\r\n    slideShows = 4\r\n}\r\njQuery('.slider-nav').slick({\r\n   slidesToShow: slideShows,\r\n   slidesToScroll: 1,\r\n   asNavFor: '.slider-for-business-partner',\r\n   dots: true,\r\n   focusOnSelect: true\r\n });\t\r\n<\/script>\r\n   \r\n  \r\n  \n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light my-research-proposal\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"proposal\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns my-research-proposal-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-research-proposal-left-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-left has-text-color\" id=\"h-my-securityproposal\" style=\"color:#3b5ea9;font-size:51px;font-style:normal;font-weight:600\">My Security<br>Proposal<\/h2>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our goals for our proposal were to address the main cyber security concerns of our partner business, as well as threats we identified through SWOT analysis and the CIA triad.<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">We proposed various network security measures to ensure that personal data from our partner\u2019s clients is not leaked or compromised in any way. Our plan implements Cloudflare, multi-factor authentication, and AES 256-bit encryption to prevent hackers from breaching systems\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our proposal was successfully granted, allowing us to implement our solution for our non-profit. This will ensure that our partner is not at a high risk of cyber attacks, protecting them for years to come.<\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-research-proposal-right-column is-layout-flow wp-block-column-is-layout-flow\">    <div class=\"wp-block-bplugins-custom-html\" id='bPluginsCustomHtml-1'>\n    <div class=\"my_research_proposal\">\n  <iframe loading=\"lazy\" src=\"https:\/\/drive.google.com\/file\/d\/1bpldFXwiwDpX19dbI3qkVnoCwc0EXJmG\/preview\" width=\"640\" height=\"480\" allow=\"autoplay\" style=\"width: 100%; height: 100%;\"><\/iframe>\n<\/div>    <\/div>\n    <\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light my-research-proposal-presentation\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"presentation\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns my-research-proposal-presentation-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-research-proposal-presentation-left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:579px\">\r\n<figure class=\"wp-block-embed is-type-rich is-provider-embed-handler wp-block-embed-embed-handler wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\r\n<iframe loading=\"lazy\" title=\"2023 YDP Cybersecurity &amp; Defense: Healthy Right Protocols for the Client\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/pGOmG2A02Kg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\r\n<\/div><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-research-proposal-presentation-right-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-left has-text-color\" id=\"h-my-securityproposalpresentation\" style=\"color:#3b5ea9;font-size:51px;font-style:normal;font-weight:600\">My Security<br>Proposal<br>Presentation<\/h2>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">During the Cybersecurity &#038; Defense Internship, I worked with Beth Cerrone and Jamie Kreider to learn about the basics of cybersecurity, and potential career pathways within it. \r\n<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Throughout the week, I worked with a company to develop cybersecurity solutions to protect against various cyber threats. I worked with my team to analyze the threats to the business, and then developed a comprehensive solution. At the end of the week, I presented my cybersecurity solution to a panel of three judges and received grant money to implement the solution.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light Internship-Highlights\" style=\"min-height:59px;aspect-ratio:unset;\" id=\"highlights\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-internship-highlights\" style=\"color:#3e5ba9;font-size:51px;font-style:normal;font-weight:600\">Internship Highlights<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tabs atbs__tabs_72c47f5a\"><ul class=\"atbs__tab-labels left make-active-tab-separate-less\" role=\"tablist\" aria-label=\"tabbed content\"><li class=\"atbs__tab-label active\" role=\"tab\" aria-selected=\"true\" aria-label=\"Security Site Tours\" tabindex=\"0\">Security Site Tours<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Business Partner Meeting\" tabindex=\"0\">Business Partner Meeting<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Working With Experts\" tabindex=\"0\">Working With Experts<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Cybersecurity Labs\" tabindex=\"0\">Cybersecurity Labs<\/li><\/ul><div class=\"atbs__tab-content\">\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Security Site Tours\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/SecurityTours.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I was given the unique opportunity to take exclusive tours of multiple government and security sites to speak directly with security professionals. During these tours, I was able to witness first-hand how cybersecurity operates at the national and international level. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">First, I received an exclusive tour of the United States Pentagon where I was able to view the interior of the Pentagon as well as see some of the different meeting rooms throughout the Department of Defense. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">We also toured the Department of Homeland Securities\u2019 Cybercrimes Center where we received classified tours of the cyber crimes unit of the DHS and learned how Homeland Security uses cyber intelligence to track major crimes such as drug smuggling, human trafficking, and major theft. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Business Partner Meeting\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0001_Healthy.png.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">In order to apply the skills I learned throughout the internship, I worked directly with an aspiring entrepreneur based in the Washington D.C. area to discuss their companies cybersecurity needs. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">After three meetings where I walked through the business model, protected information, and staff training of the companies, I worked with my team to create a staff training protocol and threat analysis for my business partner. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">At the end of the internship, I advocated for, and received funding for, my business partner to implement the cybersecurity training protocols so they can best protect their client information and continue to develop with a reduced fear of cyber attacks and cybersecurity threats. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Working With Experts\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/CyberSecExperts.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">To learn more about the world of cybersecurity, I was given the unique opportunity to speak directly with cybersecurity experts from multiple different organizations and backgrounds.<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I worked directly with one of the leading consultants in Cyber Threat Management, and a consultant for cyber policy for the National Counterintelligence Executive, Phuong Nguyen, to learn about common threat assessment and cybersecurity counterintelligence. I also heard from the global leader in Firewall Creation, David Balenson; the author of the most widely-regarded O\u2019Reilly book on cybersecurity, Michael Collins; and the lead SME for the FutureG Initiative for the Department of Defense. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">Throughout the internship, I also heard presentations from, and spoke with, representatives from the Department of Defense, Department of Homeland Security, and the National Security Agency. To learn the physical side of cybersecurity, we also had the unique opportunity to meet with globally-recognized penetration testers and network threat assessors. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Cybersecurity Labs\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/CyberLabs.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">In order to put the skills we learned to the test, I had the unique opportunity to use a cybersecurity software used for graduate instructional courses to learn a myriad of cybersecurity skills. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">Starting with network cybersecurity, I worked through labs dedicated to network security and linux to understand how networks communicate with each other and how cybersecurity poses a threat to this communication. I used these Linux skills to complete capture-the-flag coding competitions as well as virtual rooms. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">At the end of the internship, I worked with an expert from a leading cybersecurity consulting firm to learn how to built ethernet cables. I used ethernet cord, crimpers, and wire strippers to produce functioning ethernet cables. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n<\/div><\/div>\r\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"class_list":["post-7218","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyberMRuschel - Leadership Initiatives<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lichangesummer.org\/2023\/cybermruschel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberMRuschel - Leadership Initiatives\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lichangesummer.org\/2023\/cybermruschel\/\" \/>\n<meta property=\"og:site_name\" content=\"Leadership Initiatives\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-11T10:18:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"6 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/#website\",\"url\":\"https:\/\/lichangesummer.org\/2023\/\",\"name\":\"Leadership Initiatives\",\"description\":\"Programs That Inspire Students To Transform The World\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lichangesummer.org\/2023\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/cybermruschel\/#primaryimage\",\"inLanguage\":\"en\",\"url\":\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/cybermruschel\/#webpage\",\"url\":\"https:\/\/lichangesummer.org\/2023\/cybermruschel\/\",\"name\":\"CyberMRuschel - Leadership Initiatives\",\"isPartOf\":{\"@id\":\"https:\/\/lichangesummer.org\/2023\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lichangesummer.org\/2023\/cybermruschel\/#primaryimage\"},\"datePublished\":\"2023-06-05T03:38:07+00:00\",\"dateModified\":\"2023-08-11T10:18:29+00:00\",\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lichangesummer.org\/2023\/cybermruschel\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/7218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/comments?post=7218"}],"version-history":[{"count":2,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/7218\/revisions"}],"predecessor-version":[{"id":11610,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/7218\/revisions\/11610"}],"wp:attachment":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/media?parent=7218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}