{"id":232,"date":"2025-12-02T19:09:31","date_gmt":"2025-12-03T00:09:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/asherembry\/?page_id=232"},"modified":"2025-12-02T19:09:31","modified_gmt":"2025-12-03T00:09:31","slug":"ai-nist-framework-differences","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/ai-nist-framework-differences\/","title":{"rendered":"AI NIST Framework Differences"},"content":{"rendered":"\n<p>In this assignment I prompted a large language AI model to describe the differences in NIST&#8217;s Cybersecurity Framework versions 1.1 and 2.0. I annotated the model&#8217;s response with some benefits for why each change was beneficial for the new framework compared to the previous version.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/asherembry\/wp-content\/uploads\/sites\/39490\/2025\/12\/Embry-AI-NIST-Framework-Differences-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embry-AI-NIST-Framework-Differences-1.\"><\/object><a id=\"wp-block-file--media-d24c94d0-e578-44b9-8eb7-9a1a344b9565\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/wp-content\/uploads\/sites\/39490\/2025\/12\/Embry-AI-NIST-Framework-Differences-1.pdf\">Embry-AI-NIST-Framework-Differences-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/asherembry\/wp-content\/uploads\/sites\/39490\/2025\/12\/Embry-AI-NIST-Framework-Differences-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d24c94d0-e578-44b9-8eb7-9a1a344b9565\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this assignment I prompted a large language AI model to describe the differences in NIST&#8217;s Cybersecurity Framework versions 1.1 and 2.0. I annotated the model&#8217;s response with some benefits for why each change was beneficial for the new framework&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/ai-nist-framework-differences\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31334,"featured_media":0,"parent":214,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/232"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/users\/31334"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/comments?post=232"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/232\/revisions"}],"predecessor-version":[{"id":234,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/232\/revisions\/234"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/214"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/media?parent=232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}