

{"id":8971,"date":"2023-06-28T16:10:46","date_gmt":"2023-06-28T16:10:46","guid":{"rendered":"https:\/\/lichangesummer.org\/2023\/?page_id=8971"},"modified":"2023-09-08T17:26:14","modified_gmt":"2023-09-08T17:26:14","slug":"cybervsmith","status":"publish","type":"page","link":"https:\/\/lichangesummer.org\/2023\/cybervsmith\/","title":{"rendered":"CyberVSmith"},"content":{"rendered":"<style type=\"text\/css\"><\/style>\r\n<div class=\"wp-block-cover is-light home-banner\" style=\"min-height: 50px;aspect-ratio:unset;\">\r\n<div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns home-banner-column is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column home-banner-left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 60%;\">\r\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-8322\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\" alt=\"\" \/><\/figure>\r\n\r\n\r\n\r\n<h2 id=\"h-student-name\" class=\"wp-block-heading has-text-color has-montserrat-font-family has-custom-font\" style=\"color: #8b2927; font-size: 51px; font-style: normal; font-weight: 500; font-family: Montserrat;\">Victor Smith IV<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns slider-1-block is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column slider-1-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<p class=\"has-text-color has-custom-lineheight\" style=\"color: #445aa3; font-size: 31px; line-height: 1;\"><em>Saint Charles High School<\/em><br \/><em>Class of 2023<\/em><\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Received a thorough hands-on introduction to Linux and other cybersecurity software including WireShark.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Worked with global experts from various cybersecurity fields to learn advanced concepts including firewall establishment, CIA Triads, Threat Detection\/Analysis, Training Recommendations, and Legal Policies.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Created a cybersecurity protocol proposal for a growing company to best protect their client\u2019s data and personal information using network and physical security recommendations.<\/p>\r\n\r\n\r\n\r\n<p class=\"learn-more-button has-text-color\" style=\"color: #ffffff; font-size: 21px; font-style: normal; font-weight: 200;\"><strong><em>Learn more about Victor here.<\/em><\/strong><\/p>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"wp-block-columns slider-block is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column slider-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<p style=\"font-size: 14px; font-style: normal; font-weight: 200;\">Victor Smith St Charles Highschool Class of 2023 Victor Smith is excited to meet new people with diverse backgrounds, with different cultures and, work with them on this internship. He is ecstatic to see and learn new things, welcome new challenges. Also, see how this can impact his life in a positive way moving forward.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px; font-style: normal; font-weight: 200;\">Victor Smith is a recent graduate of St Charles high school in Charles Public School. During his free time, he dedicates his time to work on 3D modeling and 2D art. He also uses minor scripting to aid in his rigging process. He loves to learn about the techniques that make his favorite video games come to life and uses them in his work. With each 3d project, he always puts a conscious effort to try a new technique or challenge to learn new things. In the future, he would love to work on cybersecurity. The technical problem-solving from his 3d work, as well as work on some freelance work on the side. He enjoys learning about the measures and use of technology people need to learn and protect themselves from threats. Victor Smith is excited to meet new people with diverse backgrounds, with different cultures and, work with them on this internship. He is ecstatic to see and learn new things, welcome new challenges. Also, see how this can impact his life in a positive way moving forward Victor Smith is a recent graduate of St Charles high school at Charles Public School.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px; font-style: normal; font-weight: 200;\">During his free time, he dedicated his time to work on 3D modeling and 2D art. With each 3D project, he always puts a conscious effort to try a new technique or challenge to learn new things. He also uses minor scripting to aid in his rigging process. He loves to learn about the techniques that make his favorite video games come to life and uses them in his work. In the future, he would love to work on cybersecurity. The technical problem-solving from his 3D work, as well as work on some freelance work on the side. He enjoys learning about the measures and technology people need to learn and protect themselves from threats.<\/p>\r\n\r\n\r\n\r\n<p class=\"learn-more-button-neuro has-text-color\" style=\"color: #ffffff; font-size: 21px; font-style: normal; font-weight: 200;\"><strong><em>Read more about Victor&#8217;s achievements here.<\/em><\/strong><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column home-banner-right-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 40%;\">\r\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-7887\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0063_VSmith-Bio.png.png\" alt=\"\" \/><\/figure>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"wp-block-cover is-light my-neuroscience-training\" style=\"min-height:50px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-my-cybersecurity-training\" style=\"color:#445aa3;font-size:51px;font-style:normal;font-weight:600\">My Cybersecurity Training<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns my-neuroscience-training-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#about\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"365\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/security-highlight-1-min-1.png\" alt=\"\" class=\"wp-image-8462\" srcset=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/security-highlight-1-min-1.png 320w, https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/security-highlight-1-min-1-263x300.png 263w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#about\">Business<br> Collaboration<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#proposal\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"365\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/about-min.png\" alt=\"\" class=\"wp-image-8463\" srcset=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/about-min.png 320w, https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/about-min-263x300.png 263w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#proposal\">My Cybersecurity<br> Proposal<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#presentation\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"365\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/proposal.png\" alt=\"\" class=\"wp-image-8464\" srcset=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/proposal.png 320w, https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/proposal-263x300.png 263w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#presentation\">My Cybersecurity <br>Presentation<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#highlights\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"365\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/ethernet.png\" alt=\"\" class=\"wp-image-8465\" srcset=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/ethernet.png 320w, https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/ethernet-263x300.png 263w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#highlights\">Internship<br> Highlights<\/a><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-cover is-light business-partner-blocks\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"about\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-business-partner-overview\" style=\"color:#445aa3;font-size:51px;font-style:normal;font-weight:600\">Business Partner Overview<\/h2>\r\n\r\n\r\n  \r\n    <div class=\"main\">\r\n  <div class=\"slider slider-for-business-partner\">\r\n          <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/about-the-owner-5.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>Quick Facts<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>The National Reentry Network For Returning Citizens is a nonprofit organization that strives to give formerly incarcerated individuals a second chance to restore their lives by providing resources and support to those who need it.<\/p>\r\n\r\n<p>Housing and employment are the biggest barriers to re-entry. Therefore, The National Reentry Network For Returning Citizens primarily helps clients all over the country with these two necessities by providing them with housing and temporary occupations for up to three years free of cost. Assisting over 1000 clients over the last year, TNRNFRC has a 99% success rate of their clients not getting re-incarcerated.<\/p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0020_Reentry-1-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/quick-facts-5.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>About the Owner<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Courtney Stewart is the founder and chairman of The National Reentry Network For Returning Citizens which is a nonprofit organization dedicated to helping individuals both before and after the justice system. Mr. Stewart himself is a formerly incarcerated individual who grew up in an alcoholic family.<\/p>\r\n\r\n<p>In 2006 he founded Mentoring Works2 which gives DC youth a mentor to ensure they receive an education and mentor. Mr. Stewart understands the \u201crevolving door\u201d of incarceration and how it is easy to get stuck in that cycle. After being in prison for 8 years, he struggled to get a footing in the real world again. He wants to make a difference in the community by helping others who were in his position to get a second chance at life.<\/p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0021_Reentry-2-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/vulnerabilities-5.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>About the Business<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>The National Reentry Network For Returning Citizens was founded in 2010. They complete their mission of helping formerly incarcerated people reintegrate into society by aiding their clients in searching for jobs and securing housing. They focus on creating a network of support that focuses on supporting clients in many aspects. They also educate their clients by updating them on societal changes they may have missed while incarcerated. This includes teaching them about the latest technology and applications.<\/p>\r\n\r\n<p>One of the education programs NRNRC has in place is called Ready4Work. This program prepares its participants for the process of applying for jobs. It teaches them about the interview process, how to create a good resume, workplace culture, and more. Another part of the integration process for some clients is reuniting them with family. NRNRC provides support and a steady process to slowly bring them together. All the clients get a mentor to guide them through the entire reentry process. They create campaigns and have surveys that work towards securing the help that formerly incarcerated individuals need to become a successful member of society.<\/p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0022_Reentry-3-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/about-the-business-5.png\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Business Collaboration<\/h3>\r\n                        <h4>Current Vulnerabilities<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>The National Reentry Network for Returning Citizens is a rapidly growing organization. A large amount of the employees are not educated in phishing techniques or other cyberattacks, making them very susceptible to being attacked. Large amounts of client information are stored online and in their database. Access to this sensitive information makes the organization a possible target for hackers.<\/p>\r\n\r\n<p>Their data banks and storage can come under attack as a result of disagreement with the organization's mission. Those that oppose the National Reentry Network for Returning Citizens have the possibility of breaking into the data storage and causing systems to go awry. Protecting both the people they serve and the people that work for the organization is their biggest priority.<\/p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0023_Reentry-4-1.png-1.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n       \t \r\n\r\n  <\/div>\r\n\t\t <div class=\"action slider slider-nav\">\r\n\t               <a data-slide=\"1\" class=\"\">Quick Facts<\/a>\r\n                <a data-slide=\"2\" class=\"\">About the Owner<\/a>\r\n                <a data-slide=\"3\" class=\"\">About the Business<\/a>\r\n                <a data-slide=\"4\" class=\"\">Current Vulnerabilities<\/a>\r\n          <\/div>\r\n<\/div>\r\n\r\n<link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.5.9\/slick.min.css\">\r\n    <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.5.9\/slick-theme.min.css\"> \r\n  <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/jquery\/3.6.0\/jquery.min.js\"><\/script>\r\n  <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.8.1\/slick.min.js\"><\/script>\r\n<script>\r\n\t\r\njQuery('.slider-for-business-partner').slick({\r\n   slidesToShow: 1,\r\n   slidesToScroll: 1,\r\n   arrows: true,\r\n\tspeed: 1000,\r\n\tfade: true,\r\n\tasNavFor: '.slider-nav'\r\n });\r\nlet slideCount = 4;\r\nlet slideShows;\r\nif(slideCount != '' ){\r\n    slideShows = slideCount;\r\n} else {\r\n    slideShows = 4\r\n}\r\njQuery('.slider-nav').slick({\r\n   slidesToShow: slideShows,\r\n   slidesToScroll: 1,\r\n   asNavFor: '.slider-for-business-partner',\r\n   dots: true,\r\n   focusOnSelect: true\r\n });\t\r\n<\/script>\r\n   \r\n  \r\n  \n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light my-research-proposal\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"proposal\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns my-research-proposal-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-research-proposal-left-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-left has-text-color\" id=\"h-my-securityproposal\" style=\"color:#3b5ea9;font-size:51px;font-style:normal;font-weight:600\">My Security<br>Proposal<\/h2>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our goals for our proposal were to address the main cyber security concerns of our partner business, as well as threats we identified through SWOT analysis and the CIA triad.<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our three-part solution includes employee training, an independent wifi network, and cloud storage to protect against threats and safeguard our partner\u2019s data. The cloud storage and independent wifi network secure the systems, mitigating risk, while the employee training is to prepare for a response to an attack once it occurs.\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our proposal was successfully granted, allowing us to implement our solution for our non-profit. This will ensure that our partner is not at a high risk of physical threats, employee negligence, and hacktivists, protecting them for years to come.<\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-research-proposal-right-column is-layout-flow wp-block-column-is-layout-flow\">    <div class=\"wp-block-bplugins-custom-html\" id='bPluginsCustomHtml-1'>\n    <div class=\"my_research_proposal\">\n  <iframe loading=\"lazy\" src=\"https:\/\/drive.google.com\/file\/d\/1Y0nXcKXLmkUq-Cqz8wQARADMlxD1TBO8\/preview\" width=\"640\" height=\"480\" allow=\"autoplay\" style=\"width: 100%; height: 100%;\"><\/iframe>\n<\/div>    <\/div>\n    <\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light my-research-proposal-presentation\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"presentation\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns my-research-proposal-presentation-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-research-proposal-presentation-left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:579px\">\r\n<figure class=\"wp-block-embed is-type-rich is-provider-embed-handler wp-block-embed-embed-handler wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\r\n<iframe loading=\"lazy\" title=\"2023 YDP Cybersecurity &amp; Defense: The National Reentry Network Protocols for the Company\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/E76OhXatfsc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\r\n<\/div><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-research-proposal-presentation-right-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-left has-text-color\" id=\"h-my-securityproposalpresentation\" style=\"color:#3b5ea9;font-size:51px;font-style:normal;font-weight:600\">My Security<br>Proposal<br>Presentation<\/h2>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">During the Cybersecurity &#038; Defense Internship, I worked with Beth Cerrone and Jamie Kreider to learn about the basics of cybersecurity, and potential career pathways within it. \r\n<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Throughout the week, I worked with a company to develop cybersecurity solutions to protect against various cyber threats. I worked with my team to analyze the threats to the business, and then developed a comprehensive solution. At the end of the week, I presented my cybersecurity solution to a panel of three judges and received grant money to implement the solution.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light Internship-Highlights\" style=\"min-height:59px;aspect-ratio:unset;\" id=\"highlights\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-internship-highlights\" style=\"color:#3e5ba9;font-size:51px;font-style:normal;font-weight:600\">Internship Highlights<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tabs atbs__tabs_72c47f5a\"><ul class=\"atbs__tab-labels left make-active-tab-separate-less\" role=\"tablist\" aria-label=\"tabbed content\"><li class=\"atbs__tab-label active\" role=\"tab\" aria-selected=\"true\" aria-label=\"Security Site Tours\" tabindex=\"0\">Security Site Tours<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Business Partner Meeting\" tabindex=\"0\">Business Partner Meeting<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Working With Experts\" tabindex=\"0\">Working With Experts<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Cybersecurity Labs\" tabindex=\"0\">Cybersecurity Labs<\/li><\/ul><div class=\"atbs__tab-content\">\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Security Site Tours\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/SecurityTours.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I was given the unique opportunity to take exclusive tours of multiple government and security sites to speak directly with security professionals. During these tours, I was able to witness first-hand how cybersecurity operates at the national and international level. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">First, I received an exclusive tour of the United States Pentagon where I was able to view the interior of the Pentagon as well as see some of the different meeting rooms throughout the Department of Defense. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">We also toured the Department of Homeland Securities\u2019 Cybercrimes Center where we received classified tours of the cyber crimes unit of the DHS and learned how Homeland Security uses cyber intelligence to track major crimes such as drug smuggling, human trafficking, and major theft. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Business Partner Meeting\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/0003_Nation-Reentry.png.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">In order to apply the skills I learned throughout the internship, I worked directly with an aspiring entrepreneur based in the Washington D.C. area to discuss their companies cybersecurity needs. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">After three meetings where I walked through the business model, protected information, and staff training of the companies, I worked with my team to create a staff training protocol and threat analysis for my business partner. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">At the end of the internship, I advocated for, and received funding for, my business partner to implement the cybersecurity training protocols so they can best protect their client information and continue to develop with a reduced fear of cyber attacks and cybersecurity threats. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Working With Experts\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/CyberSecExperts.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">To learn more about the world of cybersecurity, I was given the unique opportunity to speak directly with cybersecurity experts from multiple different organizations and backgrounds.<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I worked directly with one of the leading consultants in Cyber Threat Management, and a consultant for cyber policy for the National Counterintelligence Executive, Phuong Nguyen, to learn about common threat assessment and cybersecurity counterintelligence. I also heard from the global leader in Firewall Creation, David Balenson; the author of the most widely-regarded O\u2019Reilly book on cybersecurity, Michael Collins; and the lead SME for the FutureG Initiative for the Department of Defense. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">Throughout the internship, I also heard presentations from, and spoke with, representatives from the Department of Defense, Department of Homeland Security, and the National Security Agency. To learn the physical side of cybersecurity, we also had the unique opportunity to meet with globally-recognized penetration testers and network threat assessors. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Cybersecurity Labs\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/08\/CyberLabs.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">In order to put the skills we learned to the test, I had the unique opportunity to use a cybersecurity software used for graduate instructional courses to learn a myriad of cybersecurity skills. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">Starting with network cybersecurity, I worked through labs dedicated to network security and linux to understand how networks communicate with each other and how cybersecurity poses a threat to this communication. I used these Linux skills to complete capture-the-flag coding competitions as well as virtual rooms. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">At the end of the internship, I worked with an expert from a leading cybersecurity consulting firm to learn how to built ethernet cables. I used ethernet cord, crimpers, and wire strippers to produce functioning ethernet cables. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n<\/div><\/div>\r\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"class_list":["post-8971","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyberVSmith - Leadership Initiatives<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lichangesummer.org\/2023\/cybervsmith\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberVSmith - Leadership Initiatives\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lichangesummer.org\/2023\/cybervsmith\/\" \/>\n<meta property=\"og:site_name\" content=\"Leadership Initiatives\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T17:26:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"6 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/#website\",\"url\":\"https:\/\/lichangesummer.org\/2023\/\",\"name\":\"Leadership Initiatives\",\"description\":\"Programs That Inspire Students To Transform The World\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lichangesummer.org\/2023\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/cybervsmith\/#primaryimage\",\"inLanguage\":\"en\",\"url\":\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\",\"width\":975,\"height\":240},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lichangesummer.org\/2023\/cybervsmith\/#webpage\",\"url\":\"https:\/\/lichangesummer.org\/2023\/cybervsmith\/\",\"name\":\"CyberVSmith - Leadership Initiatives\",\"isPartOf\":{\"@id\":\"https:\/\/lichangesummer.org\/2023\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lichangesummer.org\/2023\/cybervsmith\/#primaryimage\"},\"datePublished\":\"2023-06-28T16:10:46+00:00\",\"dateModified\":\"2023-09-08T17:26:14+00:00\",\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lichangesummer.org\/2023\/cybervsmith\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/8971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/comments?post=8971"}],"version-history":[{"count":4,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/8971\/revisions"}],"predecessor-version":[{"id":14881,"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/pages\/8971\/revisions\/14881"}],"wp:attachment":[{"href":"https:\/\/lichangesummer.org\/2023\/wp-json\/wp\/v2\/media?parent=8971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}