{"id":133,"date":"2024-02-03T01:20:29","date_gmt":"2024-02-03T01:20:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-04-06T18:21:00","modified_gmt":"2024-04-06T18:21:00","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity, Technology, and Society<\/h1>\n\n\n\n<p>.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-content\/uploads\/sites\/35738\/2024\/04\/The-Importance-of-SCADA-Systems-and-Mitigating-Risks.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-Importance-of-SCADA-Systems-and-Mitigating-Risks.\"><\/object><a id=\"wp-block-file--media-7146a6c9-f109-48f9-af1b-33fc5172d660\" href=\"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-content\/uploads\/sites\/35738\/2024\/04\/The-Importance-of-SCADA-Systems-and-Mitigating-Risks.pdf\">The-Importance-of-SCADA-Systems-and-Mitigating-Risks<\/a><a href=\"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-content\/uploads\/sites\/35738\/2024\/04\/The-Importance-of-SCADA-Systems-and-Mitigating-Risks.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7146a6c9-f109-48f9-af1b-33fc5172d660\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-content\/uploads\/sites\/35738\/2024\/04\/Balancing-the-Budget-for-my-Company.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Balancing-the-Budget-for-my-Company.\"><\/object><a id=\"wp-block-file--media-9548fd68-76bb-4da6-a04a-bf36a88c5c1c\" href=\"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-content\/uploads\/sites\/35738\/2024\/04\/Balancing-the-Budget-for-my-Company.pdf\">Balancing-the-Budget-for-my-Company<\/a><a href=\"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-content\/uploads\/sites\/35738\/2024\/04\/Balancing-the-Budget-for-my-Company.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9548fd68-76bb-4da6-a04a-bf36a88c5c1c\">Download<\/a><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Discussion Board: The NIST Cybersecurity Framework<\/h1>\n\n\n\n<p>8080 unread replies.9999 replies.<\/p>\n\n\n\n<p>From your readings of pages 1 &#8211; 21 of the <a href=\"https:\/\/drive.google.com\/open?id=1wPp9kofp-gdlu3NAisszeM8d8ko1djF1\" target=\"_blank\" rel=\"noreferrer noopener\">NIST Cybersecurity Framework Links to an external site.<\/a>, what benefit can organizations gain from using this framework, and how would you use it at your future workplace?<\/p>\n\n\n\n<p>Jan 20, 2024<\/p>\n\n\n\n<p>Manage Discussion Entry<\/p>\n\n\n\n<p>The NIST framework allows organizations to identify their current security posture and risk tolerance. Also determine potential areas for improvement. Organizations can use NIST framework as a base and then build on to that to meet the goals of the stakeholders. How it can be used in the workplace based on the goals and directions of the stakeholders. Based on their goals I can implant procedures, policies or implement controls to meet the desired risk tolerance.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society . Discussion Board: The NIST Cybersecurity Framework 8080 unread replies.9999 replies. From your readings of pages 1 &#8211; 21 of the NIST Cybersecurity Framework Links to an external site., what benefit can organizations gain from using this framework, and how would you use it at your future workplace? Jan 20, 2024&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/camillia-epps1\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28280,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-json\/wp\/v2\/users\/28280"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-json\/wp\/v2\/pages\/133\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/camillia-epps1\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}