{"id":654,"date":"2024-12-04T17:53:49","date_gmt":"2024-12-04T22:53:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaroncominio\/?page_id=654"},"modified":"2024-12-04T18:18:44","modified_gmt":"2024-12-04T23:18:44","slug":"class-projects","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aaroncominio\/class-projects\/","title":{"rendered":"Class Projects"},"content":{"rendered":"\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:15% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/02\/authentication-and-authorization-in-the-cia-triad\/\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"698\" src=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/image.png\" alt=\"\" class=\"wp-image-491 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/image.png 960w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/image-300x218.png 300w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/image-768x558.png 768w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/image-413x300.png 413w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/02\/authentication-and-authorization-in-the-cia-triad\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/02\/authentication-and-authorization-in-the-cia-triad\/\">Authentication and Authorization in the CIA Triad<\/a><\/h2>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:15% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/02\/securing-scada-mitigating-cybersecurity-risks-in-critical-infrastructure\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/SCADA-image.jpg\" alt=\"\" class=\"wp-image-487 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/SCADA-image.jpg 1024w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/SCADA-image-300x300.jpg 300w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/SCADA-image-150x150.jpg 150w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/SCADA-image-768x768.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/02\/securing-scada-mitigating-cybersecurity-risks-in-critical-infrastructure\/\">Securing SCADA: Mitigating Cybersecurity Risks in Critical Infrastructure<\/a><\/h2>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:15% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/02\/optimal-cybersecurity-budgeting-investing-in-people-and-technology\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/cyber-budget-1.jpg\" alt=\"\" class=\"wp-image-483 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/cyber-budget-1.jpg 1024w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/cyber-budget-1-300x300.jpg 300w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/cyber-budget-1-150x150.jpg 150w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/12\/cyber-budget-1-768x768.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/02\/optimal-cybersecurity-budgeting-investing-in-people-and-technology\/\">Optimal Cybersecurity Budgeting: Investing in People and Technology<\/a><\/h2>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Authentication and Authorization in the CIA Triad Securing SCADA: Mitigating Cybersecurity Risks in Critical Infrastructure Optimal Cybersecurity Budgeting: Investing in People and Technology<\/p>\n","protected":false},"author":29612,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/pages\/654"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/users\/29612"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/comments?post=654"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/pages\/654\/revisions"}],"predecessor-version":[{"id":667,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/pages\/654\/revisions\/667"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/media?parent=654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}