A specialist in information security and risk assessment with a demonstrated history of
working to protect computer networks and systems. An accomplished leader with a proven
track record of developing customer-centric solutions and technology strategies that offer
positive business value.
A highly motivated professional with strong analytical and problem-solving skills to identify,
analyze, and mitigate the risks of existing processes, policies, and procedures. Able
to evaluate vulnerabilities and translate complex technical concepts to administrators,
developers, and users.
Intro
Welcome, all!
Ms. Schenkelberg is a cybersecurity consultant offering cybersecurity assessments, social engineering tests, pen-testing, vulnerability scanning, and in-depth strategic analysis based in Cleveland, Ohio. With working experience coordinating and administering the maintenance of security-related control systems, including anti-virus, firewalls, intrusion prevention systems, and secure web gateway. Ms. Schenkelberg has experience addressing both sides of organizational cybersecurity.
The protection of corporate networks, equipment, and data while ensuring confidentiality, integrity, and availability of information is vital. With her extensive knowledge of incident response procedures and processes. She will help your organization design, deploy, monitor, and maintain devices, systems, applications, interconnections, and protocols for security, performance, inventory, compliance, logging, and alerting capabilities. All while ensuring the availability of systems for ongoing business operations.
Work
Reverse engineering can be used to improve cloud-based information technology (IT) systems because it offers end-users computing control. In reverse engineering cloud-based IT systems end-users can recover the design, requirement specifications, and functions of the system from an analysis of the code. This is done for a variety of reasons including, but not limited to: coping with system complexity, detecting side effects, synthesizing higher abstraction, and facilitating reuse.
The most effective advantage of reverse engineering is that it allows you, once you have broken the program down, to reassemble and patch it. To patch a file means to modify. An example of this may include changing the structure of the program thus affecting the program’s logical process. Patches allow engineers to add commands or change the behavior of each operation by inserting new snippets of code into the original code. This enables the ability to add, remove, or disable functions, and fix security vulnerabilities without the source code.
There are numerous IoT devices already infected with malware because they lack even the most basic security practices, such as strong password authentication. Recent attacks on the internet of things by botnets have drawn attention to the fact that there are many more devices vulnerable to exploitation. This is because these internet-connected devices also lack basic security practices. Exposing them to the possibility of being attacked.
Reverse engineering impacts new IT technologies, such as IoT and cloud computing, by introducing greater innovation. New and improved methods, ideas, and products. Users can learn a lot by breaking down IT technologies for inspection and then reassembling them. That is the concept behind reverse engineering. Breaking down and examining the construction of another program to understand and improve it. While security researchers reverse-engineer code to find security risks in programs. Threat actors also use this technique to understand applications and disrupt them.
Ethical Hacking
Ethical hacking is a skill that is learned over time. It takes both practice and patience to reach the right level of proficiency. Having a lab "room" can greatly enhance your learning. A lab "room" allows you to practice your skills in a stable environment, reducing the risks of practicing on real systems.
There are only two requirements for setting up this lab: Hardware and Software.
Hardware
A laptop or a desktop.
A host OS for your computer system (Windows, Linux, or Mac OS).
Software
Virtual Machine Player or Hypervisor.
Guest Operating Systems: In this tutorial, I will be primarily discussing Windows.
Once you have found and installed your favorite vulnerable assets, it is now time to get the tools required for pwning them. Install these tools on your computer to get started.
Having graduated with academic honors from Southern New Hampshire University. Ms. Schenkelberg has a bachelor’s degree in computer
science with a concentration in information security. She is a specialist in risk assessment with experience identifying, analyzing,
and mitigating the risks of existing processes, policies, and procedures. View more about Ms. Schenkelberg's qualifications here.