{"id":120,"date":"2025-09-28T02:24:18","date_gmt":"2025-09-28T02:24:18","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-09-28T16:26:14","modified_gmt":"2025-09-28T16:26:14","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"240\" height=\"320\" src=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/69717115399__59F15F7A-BE24-49E1-B9D8-3D76C99BBFD4-1.jpg\" alt=\"\" class=\"wp-image-318\" srcset=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/69717115399__59F15F7A-BE24-49E1-B9D8-3D76C99BBFD4-1.jpg 240w, https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/69717115399__59F15F7A-BE24-49E1-B9D8-3D76C99BBFD4-1-225x300.jpg 225w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">I am a Junior Computer Science major at Old Dominion University. While I am still building experience, I am determined to showcase my skills and continuous learnings.<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Post<\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<!--more-->\n<\/div><\/div>\n\n\n<ul class=\"wp-block-latest-posts__list is-grid columns-3 wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/11\/12\/write-up-scada-systems\/\">Write-Up &#8211; SCADA Systems<\/a><div class=\"wp-block-latest-posts__post-full-content\"><!-- wp:paragraph -->\n<p>Nov. 12, 2025<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>BLUF: Reducing human error and managing third party risks decreases the threats to<br>SCADA systems.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:file {\"id\":388,\"href\":\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up-SCADA-Systems-1.pdf\",\"displayPreview\":true} -->\n<div class=\"wp-block-file\"><object class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up-SCADA-Systems-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Write-Up-SCADA-Systems-1\"><\/object><a id=\"wp-block-file--media-b4592e83-56d6-4914-8fc8-c0013e85afea\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up-SCADA-Systems-1.pdf\">Write-Up-SCADA-Systems-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up-SCADA-Systems-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b4592e83-56d6-4914-8fc8-c0013e85afea\">Download<\/a><\/div>\n<!-- \/wp:file --><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/11\/11\/my-cisco-funding-plan\/\">My CISCO Funding Plan<\/a><div class=\"wp-block-latest-posts__post-full-content\"><!-- wp:paragraph -->\n<p>Nov. 11, 2025<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>BLUF: Create a budget plan for a business as CISCO.                                                      <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:file {\"id\":385,\"href\":\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/My-CISCO-Funding-Plan-1.pdf\",\"displayPreview\":true} -->\n<div class=\"wp-block-file\"><object class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/My-CISCO-Funding-Plan-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"My-CISCO-Funding-Plan-1\"><\/object><a id=\"wp-block-file--media-4fe5bff2-b89c-425d-9744-c561df4b48e0\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/My-CISCO-Funding-Plan-1.pdf\">My-CISCO-Funding-Plan-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/My-CISCO-Funding-Plan-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4fe5bff2-b89c-425d-9744-c561df4b48e0\">Download<\/a><\/div>\n<!-- \/wp:file --><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/09\/21\/ai-assignment-what-to-do-with-cybersecurity\/\">AI Assignment: What to do with Cybersecurity??<\/a><div class=\"wp-block-latest-posts__post-full-content\"><!-- wp:post-date \/-->\n\n<!-- wp:paragraph -->\n<p>BLUF: In this analysis AI will give its opinion on department placement under cybersecurity. We will then analysis the reading and create our own opinion on the research.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:file {\"id\":328,\"href\":\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/What-to-do-with-Cybersecurity-2.pdf\",\"displayPreview\":true,\"previewHeight\":380,\"backgroundColor\":\"black\"} -->\n<div class=\"wp-block-file has-black-background-color has-background\"><object class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/What-to-do-with-Cybersecurity-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:380px\" aria-label=\"What-to-do-with-Cybersecurity-2\"><\/object><a id=\"wp-block-file--media-b09dfdbf-2eae-4826-b0fe-6d9100a72ce3\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/What-to-do-with-Cybersecurity-2.pdf\">What-to-do-with-Cybersecurity-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/What-to-do-with-Cybersecurity-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b09dfdbf-2eae-4826-b0fe-6d9100a72ce3\">Download<\/a><\/div>\n<!-- \/wp:file -->\n\n<!-- wp:latest-posts \/--><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/09\/21\/ai-assignment-understanding-the-differences-between-the-nist-cybersecurity-framework-1-1-and-2-0\/\">AI Assignment: Understanding the Differences between the NIST Cybersecurity Framework 1.1 and 2.0<\/a><div class=\"wp-block-latest-posts__post-full-content\"><!-- wp:paragraph -->\n<p>Sep 21, 2025<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>BLUF: ChatGPT will write a one-page paper on the differences of NIST 1.1 and 2.0. We will analyze the reading and discuss our opinions on the differences.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:file {\"id\":382,\"href\":\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Understanding-the-Differences-between-the-NIST.pdf\",\"displayPreview\":true} -->\n<div class=\"wp-block-file\"><object class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Understanding-the-Differences-between-the-NIST.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Understanding-the-Differences-between-the-NIST\"><\/object><a id=\"wp-block-file--media-adb4ad89-73e5-4385-ade5-23b636b86986\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Understanding-the-Differences-between-the-NIST.pdf\">Understanding-the-Differences-between-the-NIST<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Understanding-the-Differences-between-the-NIST.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-adb4ad89-73e5-4385-ade5-23b636b86986\">Download<\/a><\/div>\n<!-- \/wp:file --><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/09\/14\/write-up-the-cia-triad\/\">Write \u2013 Up: The CIA Triad<\/a><div class=\"wp-block-latest-posts__post-full-content\"><!-- wp:group {\"layout\":{\"type\":\"constrained\"}} -->\n<div class=\"wp-block-group\"><!-- wp:paragraph -->\n<p>Sept. 14, 2025<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>BLUF: In this discussion we will discuss what the CIA Triad stands for and what its purpose is. Well will sources to determine the difference between authentication and authorization and how it is used in daily life.<\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:file {\"id\":376,\"href\":\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up^J-The-CIA-Triad-1.pdf\",\"displayPreview\":true} -->\n<div class=\"wp-block-file\"><object class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up^J-The-CIA-Triad-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Write-Up^J-The-CIA-Triad-1\"><\/object><a id=\"wp-block-file--media-a2d7a2bc-5b0f-44f4-b0c4-167610974581\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up^J-The-CIA-Triad-1.pdf\">Write-Up^J-The-CIA-Triad-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up^J-The-CIA-Triad-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a2d7a2bc-5b0f-44f4-b0c4-167610974581\">Download<\/a><\/div>\n<!-- \/wp:file --><\/div><\/li>\n<\/ul>\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am a Junior Computer Science major at Old Dominion University. While I am still building experience, I am determined to showcase my skills and continuous learnings. Post<\/p>\n","protected":false},"author":31599,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/users\/31599"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/pages\/120\/revisions\/334"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}