{"id":120,"date":"2023-09-25T17:19:52","date_gmt":"2023-09-25T17:19:52","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2024-01-24T01:08:53","modified_gmt":"2024-01-24T01:08:53","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bsong002\/","title":{"rendered":"About Me"},"content":{"rendered":"<p style=\"text-align: center\">Hello! My name is Benjamin Song. Some things about me is I love to try new things, am currently learning how to play the piano, and want to travel more internationally.&nbsp;<\/p>\n<p style=\"text-align: center\">As I do more research , I find that cyber security is a topic I must be more versatile in for the safety of those I care about, as well as myself.&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/bsong002\/wp-content\/uploads\/sites\/34378\/2023\/09\/IMG_1908-768x1024.jpg\" alt=\"\" class=\"wp-image-280\" srcset=\"https:\/\/sites.wp.odu.edu\/bsong002\/wp-content\/uploads\/sites\/34378\/2023\/09\/IMG_1908-768x1024.jpg 768w, https:\/\/sites.wp.odu.edu\/bsong002\/wp-content\/uploads\/sites\/34378\/2023\/09\/IMG_1908-225x300.jpg 225w, https:\/\/sites.wp.odu.edu\/bsong002\/wp-content\/uploads\/sites\/34378\/2023\/09\/IMG_1908-1152x1536.jpg 1152w, https:\/\/sites.wp.odu.edu\/bsong002\/wp-content\/uploads\/sites\/34378\/2023\/09\/IMG_1908-1536x2048.jpg 1536w, https:\/\/sites.wp.odu.edu\/bsong002\/wp-content\/uploads\/sites\/34378\/2023\/09\/IMG_1908-630x840.jpg 630w, https:\/\/sites.wp.odu.edu\/bsong002\/wp-content\/uploads\/sites\/34378\/2023\/09\/IMG_1908-960x1280.jpg 960w, https:\/\/sites.wp.odu.edu\/bsong002\/wp-content\/uploads\/sites\/34378\/2023\/09\/IMG_1908-scaled.jpg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<pre class=\"wp-block-preformatted\"><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">DISCUSSION on CRISPR<\/h2>\n\n\n\n<p>I think CRISPR technology is used best when trying to correct any genetic diseases or natural, biological deformities from birth. Being able to treat any threatening condition that would cause issues in the future, such as sickle cell anemia or cancer. And while it has shown itself useful within the agricultural space, if we were to use this technology to &#8220;genetically advance&#8221; the world around us, it would result in a world that has progressed unnaturally. Creating microscopic discrepancies that could possibly break down society and ecosystems.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"has-avatars has-dates has-excerpts no-comments wp-block-latest-comments\">No comments to show.<\/div>\n\n\n<h2 class=\"wp-block-heading\">NIST: Cybersecurity Framework<\/h2>\n\n\n\n<p>Using the NIST framework, companies and organizations can gain the trust potential customers, business partners, and shareholders alike. As information is increasingly more accessible through almost any form of technology, it is imperative that those in charge of said organizations, or businesses, keep an altruistic reputation by keeping their community&#8217;s personal data secure. In doing so, this framework promises innovative security for critical infrastructure. The framework understands the importance of protecting data within society and the economy and will be effective by remaining technologically neutral. By upholding previous standards, guidelines, and practices while evolving those standards as technology evolves, the Framework will meet the technological markets needs so that those on the internet may be protected.&nbsp;<\/p>\n\n\n\n<p>I can use the Framework by understanding it&#8217;s importance in the workplace and having a complete understanding on how the Framework works at the level I would first be working at. I would be most likely on the business\/process level or the implementation\/operations level at which I would be mostly focused on implementation progress, securing critical infrastructure, or addressing framework profiles. Implementing targeted improvements to certain gaps within the previous profiles, helping to identify new gaps, and suggesting new standards and guidelines to the updated profile would probably be within my most upcoming paygrade.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Opinions on CIA Triad<\/h2>\n\n\n\n<p class=\"has-text-align-left\">The CIA Triad, often referred to as the AIC (availability, integrity, and confidentiality) is<br>a model used by organizations and companies to develop their own security systems to create<br>solutions based on the vulnerabilities presented to them. Segmented into three parts,<br>differentiating these parts helps to guide each security team to address certain ways to deal with<br>the problem. Confidentiality refers to the security aspect of protecting information from unusual<br>sources. Integrity is more intended for the workers in charge of maintaining data so that no data<br>is changed. Lastly, availability allows for authorized users to access the confidential data and<br>properly maintain the systems so that the information may be displayed. When each standard is<br>secured, the security of the company becomes stronger and well equipped to deal with similar<br>online threats.<br>Confidentiality is one of the three stages that is designed as the firewall blocking out any<br>unwanted users to access certain information within an organization. At the same time, allowing<br>certain authenticated users to access reserved amounts of data, oftentimes personal data, to<br>safeguard the privacy of individuals within the database. Precise measures are categorized and<br>designed based on the type of damage and data after the breach of security. According to Chai<br>(2022),<br>\u201cConfidentiality measures are designed to prevent sensitive information from<br>unauthorized access attempts.\u201d<br>However, confidentiality assumes that those working to protect personal information would be<br>able to uphold the organization\u2019s standard, or integrity, so ensure that no breach of privacy is<br>ever present.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello! My name is Benjamin Song. Some things about me is I love to try new things, am currently learning how to play the piano, and want to travel more internationally.&nbsp; As I do more research , I find that cyber security is a topic I must be more versatile in for the safety of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bsong002\/\">Read More<\/a><\/div>\n","protected":false},"author":27628,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/users\/27628"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":6,"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/pages\/120\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}