top of page

Hello! I'm Dalton

 

I enjoy learning new things that can be done from the computer, to the environment, and also athletics.  I am passionate about the professional aspects of computer security, I solve problems using a computer.

  • White LinkedIn Icon
  • White Facebook Icon
  • White Twitter Icon
  • White Google+ Icon
  • White Instagram Icon

Dalton Bown

Cyber Security

 

Phone:

814-404-5648

 

Email:

dpb5194@gmail.com

 

Address:

1722 James Avenue

16801 State College, PA

​

Date of Birth:

November 22nd, 1994

​
EDUCATION
2013-2018

Bachelor's Degree

Pennsylvania State University

At Penn State I am currently double majoring in information systems technology integration and application as well as cyber security.

State College Area High School

2009-2013
High School Diploma
EXPERIENCE

BLOG

EDUCATION
EXPERIENCE
SKILLS
EXPERTISE

Applied Research Lab

At the applied research lab I developed a webpage with fedora,  I enabled a mail server on this site that was contracted to the company and later used.  I also developed ontologies for military vessels.

Mountain View Country club

At mountain I interacted and assisted with highly successful and well diverse people. Assisting with their needs and providing them with requests in a professional manner.

Network configuration
Summer 2015
Customer services
Summer 2016
CONTACT

Cyber Forensics

 

Cyber forensics is used more and more important everyday in order to convict criminals, enforce policy within a company, or dealing with a disgruntled employee.  It is important to understand that with all forensics comes some intense protocols that must be followed in order to prevent damaging or tampering of the evidence.  Many convictions now are due to the work done by cyber forensics personnel so it is important to understand how to properly handle different forms of data.  This article discusses some of the forensic methods and important things to remember when computer forensics was still at an early stage within the cyber community.

First understanding computer forensics is important in order to understand the difference between computer forensics and other forensics.  Computer forensics is combining forensics and cyber analysis to gather information within a computer in order for prosecution or other ramifications against an actor.  If you have any form of data within servers or own a company, it is important to understand computer forensics because it can save your company money as well as help you prosecute an outside actor that is attempting to or has already taken your data.  The two important types of persistent data is data that is stored on a hard drive or other device and remains intact when the computer is off. The other form of computer data volatile data, this is a type of data that is stored in computer whenever it is on but will be lost whenever the computer is turned off or loses power.  Volatile data is brief and it is critical that the investigator knows how to capture it.  Capturing the volatile data is extremely hard but usually some of the most important data is volatile.

When prosecuting someone via cyber forensics it is important to stay update with recent prosecutions.  The field is ever changing with each case that is why it is crucial, in order to hold a credible case you must follow the procedures that are already established or else you may run the risk of losing the prosecution.  One credible source to research some of the most up to date cases is the United States department of Justice cyber crime website.  It is always important to stay up to date with the required laws that are being passed with storage of data in order to avoid litigation or prosecution when the data becomes compromised.  This will save the company money in the long run because they will be able to avoid lawsuits due to the fact that data is increasingly compromised and there is no sure way to avoid compromised data.  A systems administrator that is up to date with how to properly comply to cyber forensics legal application will be crucial toward the company in the case that the company faces legal action.

If companies can stay up to date with the new and every changing laws that surround cyber forensics not only will they prevent money loss but it will also serve as added protection within the company.  The laws and practices that surround computer laws are readily available if the cyber forensics unit can stay up to date with them they can avoid troubles that present themselves.  

More information can be found here https://www.us-cert.gov/sites/default/files/publications/forensics.pdf

Objective          To obtain an internship in the field of Information Sciences and Technology or Security and Risk Analysis

Education         The Pennsylvania State University, University Park, PA 16802                         Fall 2018

                            Bachelor of Science in Information Sciences and Technology and Security and Risk Analysis                                                                                                                                                   

                            Junior Class Standing

 

Work                  The Applied Research Lab at Penn State                                                               University Park, PA

Experience        Undergraduate Research Intern                                                                              Summer 2015

  • Worked on developing ontologies using Visio and Protégé

  • Built a website using MediaWiki through Fedora and enabled a mail server on the website

                

Volunteer  work      Youth Ice Hockey Assistant Coach                                                                          2014-2016                                                                     Level 1 Certified                                                                                                          State College, PA                                                         

  • Attend weekly practices and games to help coach a team of 9/10 year old players

                            

                             THON 2015 Rules and Regulations Committee                                                    2014-2015

  • Participated in canning, fundraising, planning, training and security to support event

 

                             Tennessee Outreach Project                                                                                    Two Weeks 2011-2012                                                                                                                                                           Service Projects                             Cumberland Pines, TN                                                                                                           

  • Hands on work experience to include painting, yard work, and small building projects such as decks, roofs and sheds for underprivileged families

  • Provided fellowship to the families

 

St. Paul’s United Methodist Church                                                                                                       Spring 2011, 2012

Service Projects                                                                                                                                                                                                                                                 State College, PA                               

  • Provided spring yard clean up to church families                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        

Activities/         State College Varsity Ice Hockey Team Captain                                                  2012-2013                                    

Honors               Badger Bob Johnson Award                                                                                     2013

  • Leadership, Character, and Positive Attitude

                

                 State College High School Hockey, Baseball, Football                                       2009-2013

                 PSU Student Hockey League, IM Flag Football, Soccer                                      2013-2016

 

Computer         MediaWiki, Fedora, Visio, Protégé,  Java, Python, SQL, NoSQL

Skills                   Cisco 1 – Creation of Networks with Packet Tracer, A+ Essentials - Assembling of Computers

                 Ethical Hacking - Backtrack 5, Wireshark, Cain & Abel

                 CCNA Discovery: Working at Small to Medium Business or ISP

In a little over a month tax season will be here and a lot of your own sensitive information will be available on your computer so it is important to stay up to date on security within your home network and computer.  In a recent article that I read it gave out some important tips to prevent your sensitive information from being captured and stolen by thieves.  You must watch out for tax season thieves, remember to stay safe, be careful where you are filing your returns in the event that someone is on the  network and can grab your information.

Tax season is right around the corner which means you will be using several forms of sensitive information in order to complete your taxes.  From 2015-2016 there was a 50 percent increase in these instances and those numbers are only expected to increase.  Thieves will find victims on unsuspected networks and simply gatherer the information needed using packet sniffers or other forms of software.  It is vital to be aware of the other ways as well, there was a 400 percent increase in phishing or malware attacks via emails.  It is important to always hover your mouse over a the link from a suspicious looking email.  Computer hackers can simply change the URL in the link but when you hover your mouse over the link it reveals whether or not that is the actual link that you will be brought to.  It may sometimes seem like common sense to take these steps but if you miss one false link and type in your information into that site it will be out in the world of hackers forever.  

It is important to keep your machines clean and up to date with the latest security updates.  One thing many people do not realize is that when these updates are put out they are usually to stop a hole in security.  Whenever they patch the hole they release the information that basically states how you can use the holes before the update in order to gain access to someones computer.  If you do not update your computers then anyone just messing around on a computer could gain access by simply reading the companies website about patches in the system.  Keep passwords with access to sensitive information complex and try to prevent yourself from storing them anywhere.  As I said earlier it is important to understand where you are connected and doing your taxes or anything sensitive.  If you are connected to a public WiFi hot spot then it is best to not use any sensitive information.  These hot spots are not secure and someone using the same WiFi can easily see what you are doing and take any passwords that you may use there.

Tax season is right around the corner, with all of that sensitive information zooming around the net criminal hackers and thieves are just itching to gather all the credit card numbers and social security numbers that can find.  Keep your passwords complex, your systems updated, and be careful where you are connected when you are doing taxes. To find more information please visit the website listed below where the expand a little more on certain points.

​https://staysafeonline.org/stay-safe-online/resources/simple-cybersecurity-tips-for-staying-safe-online-during-tax-time

Cyber Security Tax Season

RESUME

Hacking has reached the concerns of governments and intel agencies.  Hacking has started recently to become a concern for people that deal with infrastructures such as power grids.  This type of hacking can cause numerous malfunctions throughout a city and could potentially shut the entire city down.  Some of the things hackers could manipulate by accessing the power grid could range from stoplights to shutting down all of the electricity.  It all depends on what part of the grid the hacker gains access too.

In a recent event that was national news a hacker set off all 156 emergency sirens multiple times.  Officials are still not sure of who is responsible for this event but it is something that should concern many people.  In this ploy of merely annoyance the hacker made some sirens make loud noise on off for one night.  It seems funny and humorous but it is a major problem, the dallas mayor came out and discussed how this proves how vital it is for his city to improve the systems that control the various grids around the city.  However this is something that every single city needs to be looking into upgrading.

Had the hacker gained access to other more vital instruments that direct the city we could have seen a major issue.  These type of events can cause mass hysteria throughout a city and the country if the right systems are accessed.  These events show you the importance of cyber security.  In a world growing with technology items you never imagined could be accessed.  If you think about the various items like cars, homes, and other everyday items used gaining internet access, it’s a feast for hackers.  It is time to start thinking and planning for more events like this to happen, hackers are always a few steps ahead of security it is time for security to start catching up.


Here is a link to the article: https://www.dallasnews.com/news/dallas/2017/04/08/emergency-sirens-blare-across-dallas-county-despite-clear-weather

Hackers gain access to Dallas Emergency Alarms

bottom of page