{"id":322,"date":"2024-06-14T16:47:07","date_gmt":"2024-06-14T16:47:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cmurphy\/?page_id=322"},"modified":"2024-06-14T17:51:49","modified_gmt":"2024-06-14T17:51:49","slug":"cyse-280","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cmurphy\/cyse-280\/","title":{"rendered":"CYSE 280"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center has-large-font-size\">Windows Security and Management<\/h2>\n\n\n\n<p>In this class I learned the basics of utilizing Windows Server programs to effectively carry out cybersecurity operations and strategies. I also got to hear real-world stories about events that have shaken the cyberspace such as the NotPetya cyber attack and real stories from cybersecurity operatives and penetration testers using social engineering to detect critical flaws in security measures. At the end of the class I wrote a research paper on the Colonial Pipeline Cyber Attack that took place in May of 2021 and it can be found below. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-content\/uploads\/sites\/30666\/2024\/06\/The-Colonial-Pipeline-Ransomware-Attack-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-Colonial-Pipeline-Ransomware-Attack-1.\"><\/object><a id=\"wp-block-file--media-a23a6151-4c20-4fd2-b092-940749bc0996\" href=\"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-content\/uploads\/sites\/30666\/2024\/06\/The-Colonial-Pipeline-Ransomware-Attack-1.pdf\">The-Colonial-Pipeline-Ransomware-Attack-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-content\/uploads\/sites\/30666\/2024\/06\/The-Colonial-Pipeline-Ransomware-Attack-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a23a6151-4c20-4fd2-b092-940749bc0996\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Windows Security and Management In this class I learned the basics of utilizing Windows Server programs to effectively carry out cybersecurity operations and strategies. I also got to hear real-world stories about events that have shaken the cyberspace such as the NotPetya cyber attack and real stories from cybersecurity operatives and penetration testers using social&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cmurphy\/cyse-280\/\">Read More<\/a><\/div>\n","protected":false},"author":24976,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/pages\/322"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/users\/24976"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/comments?post=322"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/pages\/322\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/pages\/322\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cmurphy\/wp-json\/wp\/v2\/media?parent=322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}