{"id":141,"date":"2025-09-28T02:24:18","date_gmt":"2025-09-28T02:24:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-12-02T04:15:18","modified_gmt":"2025-12-02T04:15:18","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/cyse-300\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Introduction to Cybersecurity<\/h1>\n\n\n\n<p>This course provides an overview of the field of cybersecurity. Allows students to explore how technology is related to cybersecurity from different aspects. Students will learn how cybersecurity is connected business, technology, criminal justice and more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Past Course Assignments<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-2 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/09\/14\/write-up-the-cia-triad\/\">Write \u2013 Up: The CIA Triad<\/a><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Sept. 14, 2025<\/h4>\n\n\n\n<p>BLUF: In this discussion we will discuss what the CIA Triad stands for and what its purpose is. Well will sources to determine the difference between authentication and authorization and how it is used in daily life.<\/p>\n<\/div><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up^J-The-CIA-Triad.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-Up^J-The-CIA-Triad.\"><\/object><a id=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up^J-The-CIA-Triad.pdf\">Write-Up^J-The-CIA-Triad<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up^J-The-CIA-Triad.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\">Download<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-4 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/09\/21\/ai-assignment-what-to-do-with-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI Assignment: What to do with Cybersecurity??<\/a><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Sept. 21, 2025<\/h4>\n\n\n\n<p>BLUF: In this analysis AI will give its opinion on department placement under cybersecurity. We will then analysis the reading and create our own opinion on the research.<\/p>\n<\/div><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/What-to-do-with-Cybersecurity.pdf\" type=\"application\/pdf\" style=\"width:100%;height:330px\" aria-label=\"Embed of What-to-do-with-Cybersecurity.\"><\/object><a id=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/What-to-do-with-Cybersecurity.pdf\">What-to-do-with-Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/What-to-do-with-Cybersecurity.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\">Download<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/09\/21\/ai-assignment-understanding-the-differences-between-the-nist-cybersecurity-framework-1-1-and-2-0\/\">AI Assignment: Understanding the Differences between the NIST Cybersecurity Framework 1.1 and 2.0<\/a><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Sept. 21, 2025<\/h4>\n\n\n\n<p>BLUF: ChatGPT will write a one-page paper on the differences of NIST 1.1 and 2.0. We will analyze the reading and discuss our opinions on the differences.<\/p>\n<\/div><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/Understanding-the-Differences-between-the-NIST.pdf\" type=\"application\/pdf\" style=\"width:100%;height:340px\" aria-label=\"Embed of Understanding-the-Differences-between-the-NIST.\"><\/object><a id=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/Understanding-the-Differences-between-the-NIST.pdf\">Understanding-the-Differences-between-the-NIST<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/09\/Understanding-the-Differences-between-the-NIST.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\">Download<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-9 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading has-text-align-left\"><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/11\/11\/my-cisco-funding-plan\/\">My CISCO Funding Plan<\/a><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Nov. 11, 2025<\/h4>\n\n\n\n<p class=\"has-text-align-left\">BLUF: Create a budget plan for a business as CISCO.                                                      <\/p>\n<\/div><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/My-CISCO-Funding-Plan.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of My-CISCO-Funding-Plan.\"><\/object><a id=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/My-CISCO-Funding-Plan.pdf\">My-CISCO-Funding-Plan<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/My-CISCO-Funding-Plan.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\">Download<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-11 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/2025\/11\/12\/write-up-scada-systems\/\">Write-Up &#8211; SCADA Systems<\/a><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Nov. 12, 2025<\/h4>\n\n\n\n<p>BLUF: Reducing human error and managing third party risks decreases the threats to<br>SCADA systems.<\/p>\n<\/div><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up-SCADA-Systems.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-Up-SCADA-Systems.\"><\/object><a id=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\" href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up-SCADA-Systems.pdf\">Write-Up-SCADA-Systems<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-content\/uploads\/sites\/39964\/2025\/12\/Write-Up-SCADA-Systems.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-83f304dd-4814-4162-9ea8-dd9dc93976a9\">Download<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity This course provides an overview of the field of cybersecurity. Allows students to explore how technology is related to cybersecurity from different aspects. Students will learn how cybersecurity is connected business, technology, criminal justice and more. Past Course Assignments Write \u2013 Up: The CIA Triad Sept. 14, 2025 BLUF: In this discussion&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/amyahrobinson\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":31599,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/users\/31599"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":390,"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/pages\/141\/revisions\/390"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amyahrobinson\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}