{"id":126,"date":"2024-06-11T14:02:25","date_gmt":"2024-06-11T14:02:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaronjones\/?page_id=126"},"modified":"2024-06-11T14:21:13","modified_gmt":"2024-06-11T14:21:13","slug":"cyse425","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aaronjones\/cyse425\/","title":{"rendered":"CYSE425"},"content":{"rendered":"\n<p>This writing-intensive course delves into cybersecurity policy and strategy, covering the essentials of strategy development and policy making. Key topics include planning principles, risk management, the interplay between cybersecurity policies, businesses, and government institutions, and the skills needed for policy development and implementation. The course also examines the social, political, and ethical implications of cybersecurity policies, strategies for policy assessment, and the relationship between national security and cybersecurity policy.<\/p>\n\n\n\n<p>Write a paper focusing on a cybersecurity policy. What is the cybersecurity policy\/strategy you have selected?\u00a0 \u00a0Why did you choose this particular cybersecurity policy\/strategy?<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/Policy-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Policy-1.\"><\/object><a id=\"wp-block-file--media-3e126f23-d73a-4805-956f-e2c8c347fd46\" href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/Policy-1.pdf\">Policy-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/Policy-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3e126f23-d73a-4805-956f-e2c8c347fd46\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This writing-intensive course delves into cybersecurity policy and strategy, covering the essentials of strategy development and policy making. Key topics include planning principles, risk management, the interplay between cybersecurity policies, businesses, and government institutions, and the skills needed for policy development and implementation. The course also examines the social, political, and ethical implications of cybersecurity &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/cyse425\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE425<\/span><\/a><\/p>\n","protected":false},"author":25292,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/126"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/users\/25292"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/comments?post=126"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/126\/revisions"}],"predecessor-version":[{"id":139,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/126\/revisions\/139"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/media?parent=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}