SlideShare a Scribd company logo
1 of 20
Download to read offline
natalieacevedo355@yahoo.com (210) 454-1979
(210) 454-1979
natalieacevedo355@yahoo.com
Ps
IA
Id
Mu
Technical Skills
Profile
Work Experience
Pursing Bachelors Of Fine Arts in
Graphic Design
Sanford-Brown College
San Antonio Tx,78250
Education Freelance Work
Designed logos for different com-
panies, such a Project X Print Co,
Advantage Sci, Vital Apps
Freelance in artwork for clients,
as in painting band flags, patches,
accessories, basic graphics for
T-shirts done manually
Restaurants menus created in
Indesign software
5 years of experience in creating company logos for
privately held companies using traditional art drawing
and illustration software.
Incorporated ideas from college and secondary
research of Fortune 500 companies.
Diligently monitor marketing strategies that trend well
and are effective based on consumer reviews
Scored a 135 in Professional Special Intelligence
Assessment
Retail Stock Merchandising Associate Sales Associate
Improve mechandise and prod-
ucts space and by consolidating
Recognized by store management
and also regional director for
training new hires as a result of
my knowledge
Tueday Morning: 2014 - 2015
Unload and to unpack new
merchandise, and also including
shipments, and prepare them for
the selling on the floor
Utilize Macy’s system and proce-
dures to effciencies and Complete
support duties
Macy’s: 2014 - 2015
Branding
Idenity
Control Movie Poster
Beat’s Promotional Advertisement
Billboard Poster
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today!
I
n addition, Kiriakou admitted
that he disclosed to Journalists
A and B the name and contact
information of a CIA officer,
identified in court records as Officer
B, along with his association with
an operation to capture terrorism
subject Abu Zubaydah in 2002.
Kiriakou knew that the association
of Officer B with theAbu Zubaydah
operation was classified. Based in
part on this information, Journalist
B subsequently published a June
2008 front-page story in The New
York Times disclosing Officer B’s
alleged role in the Abu Zubaydah
operation.
Kiriakou provided this information
to journalists without inquiring
what the journalists would do
with the information. Without
Kiriakou’s knowledge, Journalist A
passed the information he obtained
from Kiriakou to an investigator at
Guantanamo Bay. The investigator
had been unable to successfully
identify either officer.
Officer is being suspicious secretly
photographed and his photographs
being tendered to high-value
terrorist detainees result Kiriakou
himself described as terrifying.
Kiriakou also admitted that he lied
to the CIA regarding the existence
and use of a classified technique,
referred to as a magic box,while
seeking permission from the CIA’s
Publications Review Board to
include the classified technique in
a book.
Mr. Kiriakou was playing
a dangerous game here. He
compromised the name of an
intelligence agent, possibly
putting that agents safety at risk.
He could have compromised
intelligence activities, and
possibly put lives in jeopardy.
In a statement of facts filed with his
plea agreement, Kiriakou admitted
that he made illegal disclosures
about two CIA employees and their
involvementinclassifiedoperations
Journalist A and ournalist Bin court
records) on multiple occasions
between 2007 and 2009. Again
here, we have an individual who
thinks the rules do not apply to him.
No malicious intent, no revenge
or greed, perhaps just wanting
to establish his knowledge and
expertise to aggrandize himself.
Still, a potentially dangerous
game for the person whom he
was referring to, and, ultimately,
dangerous to him for at least the
30 months he will be in federal
confinement.
Another BoI in the Mumbai-based
Western Navy Command has
recommended stringent action,
including dismissal from service,
against at least two commanders
for posting confidential infor-
mation and data, including location
of warships and their patrolling
patterns, on Facebook. In spite of
the size of the bust, U.S. officials
at the time presented the group‘s
spying activity as conflict.
Counter
Intelligence
Brief Homland
Security
FBI U.S. Defense
CREATING NEW
STRATGIES TO
SURROUNDER
THE SAFE!
A
dvantage SCI hosted its
first CI/Cyber Security
Seminar on Wednesday,
February 27th 2013. With more
than 35 attendees, a diverse mix
of cleared defense contractors,
government, and municipal
employees was in attendance.
Advantage SCI CEO and
President, Elsa Lee, welcomed
our guests, and provided a brief
overview of the company.
Mike discussed the art of counter
intelligence and its current state.
He delineated case examples and
current legal precedents affecting
counterintelligence. Finally, he
pointed out trends and issues the
discipline faces going forward.
Following Mike was Brian Smith
from Advantage SCI (pictured at
right, middle photo). Brian is a
retired Lieutenant Colonel from
the USAF. Brian gave an excellent
presentation on the collection of
intelligence and the methods used
by foreign governments to obtain
that intelligence.
Next, Deb Thomas (pictured
at bottom right) from The Walt
Disney Company spoke. Deb
retired from the USAF as an
OSI agent, then worked at
Boeing before joining Disney.
Deb discussed the protection of
intellectual property and some of
the inherent challenges. Our final
presenter of the day was Jason
Smolanoff of Stroz Friedberg.
Jason was a Supervisory
Special Agent with the FBI,
heading up one of the FBI Los
Angeles Cyber prior to joining
Stroz Friedberg. Jason gave
a very lively and informative
presentation regarding the current
state of cyber crime and the threats
we face going forward into the
electronic world.
Our seminar was a great success.
Our guests provided great reviews
of the day’s presentations. With
the favorable reviews and positive
comments, another seminar will
be planned for the late summer
or early fall. The next arrest of
interest is outlined In this brief
extract from the Washington
Examiner at web link:
http://washingtonexaminer.com/
watchdog-alert-fbi -arrests-nasa-
contract-employer-trying-to-flee-
to- china/article/2524691
iTravelSafe App allows you
when you travel and you can
check if the state is safe or not.
where the arrest of Chinese
national Bo Jiang is reported:
Jiang was employed by the
National Institute of Aerospace,
a Hampton, VA-based NASA
contractor. The position afforded
Jiang virtually unlimited to a
unescorted access to the NASL
angley cility, which is the location
for classified.
China, was sentenced to nine years
in prison in connection with his
efforts to sell for personal financial
gain classified photographs,
information and access related
to the U.S. Consulate to China’s
Ministry of State Security (MSS),
announced Lisa Monaco,Assistant
Attorney General for the Justice
Department’s National Security
Division; Ronald C.
Trading
Confidential
Is Leading
To Crime!
B
elow, from the FBI website
is a new internet scam. The
scam generates fake emails
that appear to be coming from
the FBI. Recipients of the email
are faced with a dilemma. Pay up
or your computer will be locked
(frozen, inoperable) until the fee is
paid. Of course, it‘s a scam. Pic-
tured above is an example of what
such an email would look like.
Please view the original post at the
following hyperlink.
h t t p : / / w w w. f b i . g o v / n e w s /
stories/2012/august/new
-internet-scam
There is a new drive-by virus
on the Internet, and it often
carries a fake message and
fine purportedly from the FBI.
“Were getting inundated with
complaints, ”said Donna Gregory
of the Internet Crime Complaint
Center (IC3), referring to the virus
known as Reveton ransomware,
which is designed to extort money
from its victims.
The information provided at
OnGuardOnline.gov is valuable
to security educators, Counter
intelligence are professionals, that
are cleared individuals, and relative
family members alike.
Reveton is described as drive-
by malware because unlike many
viruses which activate when users
open a file or attachment this
one can install itself when users
simply click on a compromised
website. Once infected, the victim‘s
computer immediately locks, and
the monitor displays a screen stating
there has been a violation of federal
law.The bogus message goes on to
say that the user‘s Internet address
was identified by the FBI.
Recent analysis from the FBI
and other government agencies
demonstrates that malicious actors
are targeting travelers abroad
through pop-up windows while
they are establishing an Internet
connection in their hotel rooms.
Recently, there have been instances
of travelers‘ laptops being infected
with malicious software while
using hotel Internet connections.
In these instances, the traveler
was attempting to set up the hotel
room Internet connection and was
pre- sented with a pop-up window
notifying the user to update a widely
used software product.
If the user clicked to accept
and install the update, malicious
software was installed on the laptop.
The popup window appeared to
be offering a routine update to a
legitimate software product for
which updates are frequently
available.
The Federal Trade Commission
manages On GuardOnline.
gov, in partnership a variety of
Federal Government agencies,
departments, bureaus, offices and
otherentities to OnGuardOnline.
gov is a partner in the Stop Think
Connect campaign, led by the
Department of Homeland Security,
and part of the National Initiative
for Cybersecurity Education, led by
the National Institute of Standards
and Technology. Readers of our
publication are encouraged to
provide electronic copies of this
publication to individuals that might
benefit from the tips located at the
hyperlinks that follow. And by all
means,pleaseencourageyourclients
to visit the OnGuardOnline.gov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement

More Related Content

What's hot

Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Hacking secrets to becoming a genius hacker how to hack smartphones, computer...
Hacking secrets to becoming a genius hacker how to hack smartphones, computer...Hacking secrets to becoming a genius hacker how to hack smartphones, computer...
Hacking secrets to becoming a genius hacker how to hack smartphones, computer...Vu Tru So
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Digital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging TacticDigital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging TacticChristopher Porter
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerDarren Chaker
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)Neeraj Mahajan
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)Felipe Prado
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceMubarak Al Hadadi
 

What's hot (17)

Darkside
DarksideDarkside
Darkside
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Hacking secrets to becoming a genius hacker how to hack smartphones, computer...
Hacking secrets to becoming a genius hacker how to hack smartphones, computer...Hacking secrets to becoming a genius hacker how to hack smartphones, computer...
Hacking secrets to becoming a genius hacker how to hack smartphones, computer...
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Digital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging TacticDigital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging Tactic
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-Chaker
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
ID Theft
ID TheftID Theft
ID Theft
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
 

Viewers also liked

11. Усходнеславянскія плямёны на тэрыторыі Беларусі
11. Усходнеславянскія плямёны на тэрыторыі Беларусі11. Усходнеславянскія плямёны на тэрыторыі Беларусі
11. Усходнеславянскія плямёны на тэрыторыі БеларусіAnastasiyaF
 
Sambutan Presiden RI Pada HUT KORPRI Ke 45 Tahun 2016
Sambutan Presiden RI Pada HUT KORPRI Ke 45 Tahun 2016Sambutan Presiden RI Pada HUT KORPRI Ke 45 Tahun 2016
Sambutan Presiden RI Pada HUT KORPRI Ke 45 Tahun 2016Muhammad Sirajuddin
 
Peplum design bandage dress types
Peplum design bandage dress typesPeplum design bandage dress types
Peplum design bandage dress typeslee shin
 
Creación de bases de datos en sql server
Creación de bases de datos en sql serverCreación de bases de datos en sql server
Creación de bases de datos en sql serveringrid garcia
 
14. Рэлігія і міфалогія ўсходніх славян
14. Рэлігія і міфалогія ўсходніх славян14. Рэлігія і міфалогія ўсходніх славян
14. Рэлігія і міфалогія ўсходніх славянAnastasiyaF
 
Top 8 beauty specialist resume samples
Top 8 beauty specialist resume samplesTop 8 beauty specialist resume samples
Top 8 beauty specialist resume samplestonychoper6605
 
A Summary of the US Economy through Corporate Finance
A Summary of the US Economy through Corporate FinanceA Summary of the US Economy through Corporate Finance
A Summary of the US Economy through Corporate FinancePranav Ghai
 
Jak vybrat správný gril
Jak vybrat správný grilJak vybrat správný gril
Jak vybrat správný grilSmutekMartin
 
Moore, Rebekah E_Public Work Sample_LR
Moore, Rebekah E_Public Work Sample_LRMoore, Rebekah E_Public Work Sample_LR
Moore, Rebekah E_Public Work Sample_LRRebekah E. Moore, PhD
 
Które z nowych rynków zagranicznych stanowią realną szansę dla polskiej branż...
Które z nowych rynków zagranicznych stanowią realną szansę dla polskiej branż...Które z nowych rynków zagranicznych stanowią realną szansę dla polskiej branż...
Które z nowych rynków zagranicznych stanowią realną szansę dla polskiej branż...Marketing w transporcie
 
Rbs – rutherford backscattering spectrometry
Rbs – rutherford backscattering spectrometryRbs – rutherford backscattering spectrometry
Rbs – rutherford backscattering spectrometryPelagia Tsintari
 
công ty làm phim quảng cáo uy tín
công ty làm phim quảng cáo uy tíncông ty làm phim quảng cáo uy tín
công ty làm phim quảng cáo uy tínefrain470
 
PortfolioDrBarbaraCox
PortfolioDrBarbaraCoxPortfolioDrBarbaraCox
PortfolioDrBarbaraCoxBarbara Cox
 

Viewers also liked (20)

11. Усходнеславянскія плямёны на тэрыторыі Беларусі
11. Усходнеславянскія плямёны на тэрыторыі Беларусі11. Усходнеславянскія плямёны на тэрыторыі Беларусі
11. Усходнеславянскія плямёны на тэрыторыі Беларусі
 
Sambutan Presiden RI Pada HUT KORPRI Ke 45 Tahun 2016
Sambutan Presiden RI Pada HUT KORPRI Ke 45 Tahun 2016Sambutan Presiden RI Pada HUT KORPRI Ke 45 Tahun 2016
Sambutan Presiden RI Pada HUT KORPRI Ke 45 Tahun 2016
 
Peplum design bandage dress types
Peplum design bandage dress typesPeplum design bandage dress types
Peplum design bandage dress types
 
Citas y organizadores
Citas y organizadoresCitas y organizadores
Citas y organizadores
 
Halley_Barnett_2016
Halley_Barnett_2016Halley_Barnett_2016
Halley_Barnett_2016
 
Creación de bases de datos en sql server
Creación de bases de datos en sql serverCreación de bases de datos en sql server
Creación de bases de datos en sql server
 
14. Рэлігія і міфалогія ўсходніх славян
14. Рэлігія і міфалогія ўсходніх славян14. Рэлігія і міфалогія ўсходніх славян
14. Рэлігія і міфалогія ўсходніх славян
 
Top 8 beauty specialist resume samples
Top 8 beauty specialist resume samplesTop 8 beauty specialist resume samples
Top 8 beauty specialist resume samples
 
C-LEVEL EXECUTIVE DAVIDSON BRIEF CV and CL 06-2015
C-LEVEL EXECUTIVE DAVIDSON BRIEF CV and CL 06-2015C-LEVEL EXECUTIVE DAVIDSON BRIEF CV and CL 06-2015
C-LEVEL EXECUTIVE DAVIDSON BRIEF CV and CL 06-2015
 
Empty place
Empty placeEmpty place
Empty place
 
A Summary of the US Economy through Corporate Finance
A Summary of the US Economy through Corporate FinanceA Summary of the US Economy through Corporate Finance
A Summary of the US Economy through Corporate Finance
 
Jak vybrat správný gril
Jak vybrat správný grilJak vybrat správný gril
Jak vybrat správný gril
 
Moore, Rebekah E_Public Work Sample_LR
Moore, Rebekah E_Public Work Sample_LRMoore, Rebekah E_Public Work Sample_LR
Moore, Rebekah E_Public Work Sample_LR
 
El manejo de word
El manejo de wordEl manejo de word
El manejo de word
 
Które z nowych rynków zagranicznych stanowią realną szansę dla polskiej branż...
Które z nowych rynków zagranicznych stanowią realną szansę dla polskiej branż...Które z nowych rynków zagranicznych stanowią realną szansę dla polskiej branż...
Które z nowych rynków zagranicznych stanowią realną szansę dla polskiej branż...
 
Rbs – rutherford backscattering spectrometry
Rbs – rutherford backscattering spectrometryRbs – rutherford backscattering spectrometry
Rbs – rutherford backscattering spectrometry
 
công ty làm phim quảng cáo uy tín
công ty làm phim quảng cáo uy tíncông ty làm phim quảng cáo uy tín
công ty làm phim quảng cáo uy tín
 
Untitled 2
Untitled 2Untitled 2
Untitled 2
 
PortfolioDrBarbaraCox
PortfolioDrBarbaraCoxPortfolioDrBarbaraCox
PortfolioDrBarbaraCox
 
2558 project
2558 project 2558 project
2558 project
 

Similar to Natalie's Acevedo Porfolio digital

The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxjoshua2345678
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Chelsea Porter
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
The Brazilian Cybercriminal Underground in 2015
The Brazilian Cybercriminal Underground in 2015The Brazilian Cybercriminal Underground in 2015
The Brazilian Cybercriminal Underground in 2015Felipe Prado
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdfaesalem06
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesPYA, P.C.
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docxvickeryr87
 

Similar to Natalie's Acevedo Porfolio digital (20)

The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
The Brazilian Cybercriminal Underground in 2015
The Brazilian Cybercriminal Underground in 2015The Brazilian Cybercriminal Underground in 2015
The Brazilian Cybercriminal Underground in 2015
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx
 

Recently uploaded

Untitled presedddddddddddddddddntation (1).pptx
Untitled presedddddddddddddddddntation (1).pptxUntitled presedddddddddddddddddntation (1).pptx
Untitled presedddddddddddddddddntation (1).pptxmapanig881
 
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree ttt fff
 
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证nhjeo1gg
 
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一A SSS
 
Architecture case study India Habitat Centre, Delhi.pdf
Architecture case study India Habitat Centre, Delhi.pdfArchitecture case study India Habitat Centre, Delhi.pdf
Architecture case study India Habitat Centre, Delhi.pdfSumit Lathwal
 
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
PORTAFOLIO   2024_  ANASTASIYA  KUDINOVAPORTAFOLIO   2024_  ANASTASIYA  KUDINOVA
PORTAFOLIO 2024_ ANASTASIYA KUDINOVAAnastasiya Kudinova
 
Top 10 Modern Web Design Trends for 2025
Top 10 Modern Web Design Trends for 2025Top 10 Modern Web Design Trends for 2025
Top 10 Modern Web Design Trends for 2025Rndexperts
 
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...katerynaivanenko1
 
Passbook project document_april_21__.pdf
Passbook project document_april_21__.pdfPassbook project document_april_21__.pdf
Passbook project document_april_21__.pdfvaibhavkanaujia
 
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
FiveHypotheses_UIDMasterclass_18April2024.pdf
FiveHypotheses_UIDMasterclass_18April2024.pdfFiveHypotheses_UIDMasterclass_18April2024.pdf
FiveHypotheses_UIDMasterclass_18April2024.pdfShivakumar Viswanathan
 
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一F dds
 
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改yuu sss
 
How to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIHow to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIyuj
 
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,Aginakm1
 
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)jennyeacort
 
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...mrchrns005
 
Design principles on typography in design
Design principles on typography in designDesign principles on typography in design
Design principles on typography in designnooreen17
 

Recently uploaded (20)

Untitled presedddddddddddddddddntation (1).pptx
Untitled presedddddddddddddddddntation (1).pptxUntitled presedddddddddddddddddntation (1).pptx
Untitled presedddddddddddddddddntation (1).pptx
 
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
 
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
 
Architecture case study India Habitat Centre, Delhi.pdf
Architecture case study India Habitat Centre, Delhi.pdfArchitecture case study India Habitat Centre, Delhi.pdf
Architecture case study India Habitat Centre, Delhi.pdf
 
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
PORTAFOLIO   2024_  ANASTASIYA  KUDINOVAPORTAFOLIO   2024_  ANASTASIYA  KUDINOVA
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
 
Top 10 Modern Web Design Trends for 2025
Top 10 Modern Web Design Trends for 2025Top 10 Modern Web Design Trends for 2025
Top 10 Modern Web Design Trends for 2025
 
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
 
Passbook project document_april_21__.pdf
Passbook project document_april_21__.pdfPassbook project document_april_21__.pdf
Passbook project document_april_21__.pdf
 
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
 
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
 
FiveHypotheses_UIDMasterclass_18April2024.pdf
FiveHypotheses_UIDMasterclass_18April2024.pdfFiveHypotheses_UIDMasterclass_18April2024.pdf
FiveHypotheses_UIDMasterclass_18April2024.pdf
 
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
 
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
 
How to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIHow to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AI
 
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
 
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
 
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
 
Design principles on typography in design
Design principles on typography in designDesign principles on typography in design
Design principles on typography in design
 

Natalie's Acevedo Porfolio digital

  • 2. (210) 454-1979 natalieacevedo355@yahoo.com Ps IA Id Mu Technical Skills Profile Work Experience Pursing Bachelors Of Fine Arts in Graphic Design Sanford-Brown College San Antonio Tx,78250 Education Freelance Work Designed logos for different com- panies, such a Project X Print Co, Advantage Sci, Vital Apps Freelance in artwork for clients, as in painting band flags, patches, accessories, basic graphics for T-shirts done manually Restaurants menus created in Indesign software 5 years of experience in creating company logos for privately held companies using traditional art drawing and illustration software. Incorporated ideas from college and secondary research of Fortune 500 companies. Diligently monitor marketing strategies that trend well and are effective based on consumer reviews Scored a 135 in Professional Special Intelligence Assessment Retail Stock Merchandising Associate Sales Associate Improve mechandise and prod- ucts space and by consolidating Recognized by store management and also regional director for training new hires as a result of my knowledge Tueday Morning: 2014 - 2015 Unload and to unpack new merchandise, and also including shipments, and prepare them for the selling on the floor Utilize Macy’s system and proce- dures to effciencies and Complete support duties Macy’s: 2014 - 2015
  • 14. I n addition, Kiriakou admitted that he disclosed to Journalists A and B the name and contact information of a CIA officer, identified in court records as Officer B, along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002. Kiriakou knew that the association of Officer B with theAbu Zubaydah operation was classified. Based in part on this information, Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer B’s alleged role in the Abu Zubaydah operation. Kiriakou provided this information to journalists without inquiring what the journalists would do with the information. Without Kiriakou’s knowledge, Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay. The investigator had been unable to successfully identify either officer. Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifying. Kiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique, referred to as a magic box,while seeking permission from the CIA’s Publications Review Board to include the classified technique in a book. Mr. Kiriakou was playing a dangerous game here. He compromised the name of an intelligence agent, possibly putting that agents safety at risk. He could have compromised intelligence activities, and possibly put lives in jeopardy. In a statement of facts filed with his plea agreement, Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvementinclassifiedoperations Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009. Again here, we have an individual who thinks the rules do not apply to him. No malicious intent, no revenge or greed, perhaps just wanting to establish his knowledge and expertise to aggrandize himself. Still, a potentially dangerous game for the person whom he was referring to, and, ultimately, dangerous to him for at least the 30 months he will be in federal confinement. Another BoI in the Mumbai-based Western Navy Command has recommended stringent action, including dismissal from service, against at least two commanders for posting confidential infor- mation and data, including location of warships and their patrolling patterns, on Facebook. In spite of the size of the bust, U.S. officials at the time presented the group‘s spying activity as conflict. Counter Intelligence Brief Homland Security FBI U.S. Defense
  • 15. CREATING NEW STRATGIES TO SURROUNDER THE SAFE! A dvantage SCI hosted its first CI/Cyber Security Seminar on Wednesday, February 27th 2013. With more than 35 attendees, a diverse mix of cleared defense contractors, government, and municipal employees was in attendance. Advantage SCI CEO and President, Elsa Lee, welcomed our guests, and provided a brief overview of the company. Mike discussed the art of counter intelligence and its current state. He delineated case examples and current legal precedents affecting counterintelligence. Finally, he pointed out trends and issues the discipline faces going forward. Following Mike was Brian Smith from Advantage SCI (pictured at right, middle photo). Brian is a retired Lieutenant Colonel from the USAF. Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence. Next, Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke. Deb retired from the USAF as an OSI agent, then worked at Boeing before joining Disney. Deb discussed the protection of intellectual property and some of the inherent challenges. Our final presenter of the day was Jason Smolanoff of Stroz Friedberg. Jason was a Supervisory Special Agent with the FBI, heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg. Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world. Our seminar was a great success. Our guests provided great reviews of the day’s presentations. With the favorable reviews and positive comments, another seminar will be planned for the late summer or early fall. The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link: http://washingtonexaminer.com/ watchdog-alert-fbi -arrests-nasa- contract-employer-trying-to-flee- to- china/article/2524691 iTravelSafe App allows you when you travel and you can check if the state is safe or not. where the arrest of Chinese national Bo Jiang is reported: Jiang was employed by the National Institute of Aerospace, a Hampton, VA-based NASA contractor. The position afforded Jiang virtually unlimited to a unescorted access to the NASL angley cility, which is the location for classified. China, was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs, information and access related to the U.S. Consulate to China’s Ministry of State Security (MSS), announced Lisa Monaco,Assistant Attorney General for the Justice Department’s National Security Division; Ronald C.
  • 16. Trading Confidential Is Leading To Crime! B elow, from the FBI website is a new internet scam. The scam generates fake emails that appear to be coming from the FBI. Recipients of the email are faced with a dilemma. Pay up or your computer will be locked (frozen, inoperable) until the fee is paid. Of course, it‘s a scam. Pic- tured above is an example of what such an email would look like. Please view the original post at the following hyperlink. h t t p : / / w w w. f b i . g o v / n e w s / stories/2012/august/new -internet-scam There is a new drive-by virus on the Internet, and it often carries a fake message and fine purportedly from the FBI. “Were getting inundated with complaints, ”said Donna Gregory of the Internet Crime Complaint Center (IC3), referring to the virus known as Reveton ransomware, which is designed to extort money from its victims. The information provided at OnGuardOnline.gov is valuable to security educators, Counter intelligence are professionals, that are cleared individuals, and relative family members alike. Reveton is described as drive- by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website. Once infected, the victim‘s computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law.The bogus message goes on to say that the user‘s Internet address was identified by the FBI. Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms. Recently, there have been instances of travelers‘ laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product. If the user clicked to accept and install the update, malicious software was installed on the laptop. The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available. The Federal Trade Commission manages On GuardOnline. gov, in partnership a variety of Federal Government agencies, departments, bureaus, offices and otherentities to OnGuardOnline. gov is a partner in the Stop Think Connect campaign, led by the Department of Homeland Security, and part of the National Initiative for Cybersecurity Education, led by the National Institute of Standards and Technology. Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow. And by all means,pleaseencourageyourclients to visit the OnGuardOnline.gov