{"id":152,"date":"2022-09-25T20:58:04","date_gmt":"2022-09-25T20:58:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=152"},"modified":"2024-06-14T13:58:55","modified_gmt":"2024-06-14T13:58:55","slug":"crjs-405","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cmurphy\/crjs-405\/","title":{"rendered":"CYSE 425W"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>Cybersecurity Strategy and Policy <\/strong><\/h2>\n\n\n\n<p>In this class, learned about how policy making and strategies are important for the role of Cybersecurity in our infrastructure. They demonstrated the importance of innovating and changing policy based on the climate of the cyberspace as technology advances as well as the threats corresponding. Attached are essays I wrote while performing research on a chosen Cyber policy, the European Union&#8217;s General Data Protection Regulation (GDPR). <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-content\/uploads\/sites\/30666\/2024\/06\/CYSE425W_Paper^N2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE425W_Paper^N2-1.\"><\/object><a id=\"wp-block-file--media-f4300b94-a9e1-4300-a4d3-b4679fffee19\" href=\"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-content\/uploads\/sites\/30666\/2024\/06\/CYSE425W_Paper^N2-1.pdf\">CYSE425W_Paper^N2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-content\/uploads\/sites\/30666\/2024\/06\/CYSE425W_Paper^N2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f4300b94-a9e1-4300-a4d3-b4679fffee19\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Strategy and Policy In this class, learned about how policy making and strategies are important for the role of Cybersecurity in our infrastructure. They demonstrated the importance of innovating and changing policy based on the climate of the cyberspace as technology advances as well as the threats corresponding. Attached are essays I wrote while&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cmurphy\/crjs-405\/\">Read More<\/a><\/div>\n","protected":false},"author":24976,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/pages\/152"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/users\/24976"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/pages\/152\/revisions"}],"predecessor-version":[{"id":310,"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/pages\/152\/revisions\/310"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/media?parent=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}