{"id":144,"date":"2024-02-02T01:22:46","date_gmt":"2024-02-02T01:22:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=144"},"modified":"2024-04-19T02:32:03","modified_gmt":"2024-04-19T02:32:03","slug":"blog","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/alyssasurl\/blog\/","title":{"rendered":"Alyssa&#8217;s Blogs"},"content":{"rendered":"\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-302 post type-post status-publish format-standard hentry category-uncategorized\">\n<h2 class=\"has-text-align-center wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/alyssasurl\/2024\/04\/19\/opportunities-for-workplace-deviance\/\" target=\"_self\" >Opportunities for Workplace Deviance<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">In the modern day of technology, work place deviance can easily take place in cyber technology. One reason is because the deviance can occur over the web rather than in person. For a example, in the cyber technology, if an employee was fired and had spite, they could download sensitive information and put it for&#8230;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-04-19T01:43:21+00:00\">April 19, 2024<\/time><\/div>\n<\/li><li class=\"wp-block-post post-300 post type-post status-publish format-standard hentry category-uncategorized\">\n<h2 class=\"has-text-align-center wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/alyssasurl\/2024\/04\/19\/discussion-board-protecting-availability\/\" target=\"_self\" >Protecting Availability<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">As the Chief Information Security Officer (CISO) for a publicly traded company, there are a few protections I would set in place to ensure the availability of the systems. Some of these systems correspond to maintaining operations, protecting customer information, and regulating requirements. I would implement a few steps and protections to guarantee the system&#8217;s&#8230;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-04-19T01:40:28+00:00\">April 19, 2024<\/time><\/div>\n<\/li><li class=\"wp-block-post post-298 post type-post status-publish format-standard hentry category-uncategorized\">\n<h2 class=\"has-text-align-center wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/alyssasurl\/2024\/04\/19\/in-class-assignment-understanding-the-supply-chain-01-30\/\" target=\"_self\" >Understanding the Supply Chain<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">There are a few different parts that make up a shoe. The first prominent partwould be the outer layer, which displays the unique design of the shoes. This layer willhave to have stitching to keep the shoes together; the lining for the shoes will beincluded. Also, the color of the design comes into play. Next&#8230;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-04-19T01:36:35+00:00\">April 19, 2024<\/time><\/div>\n<\/li><\/ul><\/div>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><\/div>\n\n\n<div class=\"has-avatars has-dates has-excerpts no-comments wp-block-latest-comments\">No comments to show.<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":28585,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alyssasurl\/wp-json\/wp\/v2\/pages\/144"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alyssasurl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alyssasurl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alyssasurl\/wp-json\/wp\/v2\/users\/28585"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alyssasurl\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/alyssasurl\/wp-json\/wp\/v2\/pages\/144\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/sites.wp.odu.edu\/alyssasurl\/wp-json\/wp\/v2\/pages\/144\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alyssasurl\/wp-json\/wp\/v2\/media?parent=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}