{"id":505,"date":"2024-04-20T07:15:22","date_gmt":"2024-04-20T07:15:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/?p=505"},"modified":"2024-04-20T07:15:22","modified_gmt":"2024-04-20T07:15:22","slug":"policy-analysis-paper-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/2024\/04\/20\/policy-analysis-paper-1\/","title":{"rendered":"Policy Analysis Paper 1"},"content":{"rendered":"\n<p>Write a paper focusing on a cybersecurity policy. What is the cybersecurity policy\/strategy you have selected?&nbsp; &nbsp;Why did you choose this particular cybersecurity policy\/strategy?<\/p>\n\n\n\n<p>The focus should be on an overview of the policy, why it was developed, how it is applied, how the policy fits within a national (even international) cybersecurity policy<\/p>\n\n\n\n<ul>\n<li>Requirements:&nbsp; 425W &#8211; This should be a 500 words paper describing a cybersecurity policy\/strategy in easy to understand (layperson&#8217;s) terms.&nbsp; Use at least three scholarly journal articles that have described the policy.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-content\/uploads\/sites\/30166\/2024\/04\/annotated-425w20policy.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-425w20policy.docx.\"><\/object><a id=\"wp-block-file--media-ec1d253b-e5b4-4a13-abe7-001211777d8e\" href=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-content\/uploads\/sites\/30166\/2024\/04\/annotated-425w20policy.docx.pdf\">annotated-425w20policy.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-content\/uploads\/sites\/30166\/2024\/04\/annotated-425w20policy.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ec1d253b-e5b4-4a13-abe7-001211777d8e\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Write a paper focusing on a cybersecurity policy. What is the cybersecurity policy\/strategy you have selected?&nbsp; &nbsp;Why did you choose this particular cybersecurity policy\/strategy? The focus should be on an overview of the policy, why it was developed, how it is applied, how the policy fits within a national (even international) cybersecurity policy<\/p>\n","protected":false},"author":24668,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/posts\/505"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/users\/24668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/comments?post=505"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/posts\/505\/revisions"}],"predecessor-version":[{"id":507,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/posts\/505\/revisions\/507"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/media?parent=505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/categories?post=505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/tags?post=505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}