{"id":214,"date":"2025-12-02T18:45:22","date_gmt":"2025-12-02T23:45:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/asherembry\/?page_id=214"},"modified":"2025-12-02T19:11:48","modified_gmt":"2025-12-03T00:11:48","slug":"cyse-200t-cybersecurity-technology-society","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/","title":{"rendered":"CYSE 200T &#8211; Cybersecurity, Technology &amp; Society"},"content":{"rendered":"\n<p>In this course I learned about how cybersecurity has many differing real world interactions and uses. Through the use of engaging classroom discussions and various AI tool promptings, I learned how business, technology, criminal justice, sociology, psychology, and philosophy are parts of cybersecurity as a field. Below are some documents I created in my coursework to learn about different topics in cybersecurity.<\/p>\n\n\n<ul class=\"wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/cia-triad\/\">CIA Triad<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/scada-systems-write-up\/\">SCADA Systems Write Up<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/ai-what-to-do-with-cybersecurity\/\">AI What to do With Cybersecurity<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/ai-nist-framework-differences\/\">AI NIST Framework Differences<\/a><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>In this course I learned about how cybersecurity has many differing real world interactions and uses. Through the use of engaging classroom discussions and various AI tool promptings, I learned how business, technology, criminal justice, sociology, psychology, and philosophy are&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31334,"featured_media":0,"parent":197,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/214"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/users\/31334"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/comments?post=214"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/214\/revisions"}],"predecessor-version":[{"id":236,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/214\/revisions\/236"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/197"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/media?parent=214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}