{"id":120,"date":"2024-09-23T16:08:59","date_gmt":"2024-09-23T16:08:59","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-12-16T00:57:14","modified_gmt":"2025-12-16T00:57:14","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/coreystokes3\/","title":{"rendered":""},"content":{"rendered":"<p>This is a bit about me! My name is Corey, and I am a 19-year-old sophomore at ODU. I enjoy music, exercise, and overall having a good time! Cybersecurity interests me because it is still a relatively new area, and I have always been intrigued by technology. It would be nice to enter a career revolving around technology and its defense.<\/p>\n<p>&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"778\" height=\"601\" src=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/09\/cyber-photo-pic.png\" alt=\"\" class=\"wp-image-293\" style=\"width:308px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/09\/cyber-photo-pic.png 778w, https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/09\/cyber-photo-pic-300x232.png 300w, https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/09\/cyber-photo-pic-768x593.png 768w, https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/09\/cyber-photo-pic-388x300.png 388w\" sizes=\"(max-width: 778px) 100vw, 778px\" \/><\/figure>\n\n\n\n<p><strong>Write-ups\/discussion board posts<\/strong><\/p>\n\n\n\n<p><strong>Discussion Board: Opportunities for Workplace Deviance<\/strong><\/p>\n\n\n\n<p>Computer technology has introduced many new possibilities for deviance in the workplace, such as rule violations or acting in a manner that hurts the company. Deviance is achieved through computer abuse or internet abuse at work. For example, workers spend hours on social networks, shopping online, or viewing movies while on duty instead of focusing on work. It takes time and resources from the company.&nbsp;A good example is when workers use technology to steal. They can copy confidential documents, customer data, or business plans and forward them to others or use them for personal gain. Cyber technologies make it easy to conceal such activities, which can be dangerous for businesses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Discussion Board: The &#8220;Short Arm&#8221; of Predictive Knowledge<\/h3>\n\n\n\n<p>In&nbsp;cybersecurity, the&nbsp;&#8220;short arm&#8221;&nbsp;of predictive knowledge, Jonas&#8217;&nbsp;idea that we&nbsp;can&#8217;t know&nbsp;the long-term&nbsp;impact&nbsp;of new&nbsp;technology, calls for&nbsp;prudent&nbsp;and responsible&nbsp;handling&nbsp;of&nbsp;cyber-policy and infrastructure. Because cybersecurity threats&nbsp;are&nbsp;fast-moving&nbsp;and&nbsp;unforeseen,&nbsp;policy&nbsp;must be designed with the&nbsp;recognition&nbsp;that we can&#8217;t&nbsp;possibly&nbsp;know&nbsp;all&nbsp;outcomes&nbsp;or&nbsp;risks. Jonas would&nbsp;challenge&nbsp;us to take&nbsp;moral&nbsp;responsibility for future&nbsp;consequences. This&nbsp;involves&nbsp;bringing&nbsp;not just&nbsp;the&nbsp;technology&nbsp;experts&nbsp;and&nbsp;ethicists&nbsp;into&nbsp;the policy-making mix, but&nbsp;public&nbsp;interests,&nbsp;in&nbsp;terms&nbsp;of decision-making&nbsp;regarding&nbsp;surveillance, data collection, and&nbsp;deployment of&nbsp;AI&nbsp;systems&nbsp;with&nbsp;a&nbsp;mind for&nbsp;long-term&nbsp;social&nbsp;implications and&nbsp;not&nbsp;merely&nbsp;convenience or profit. Jonas&nbsp;warns&nbsp;that&nbsp;we&nbsp;need&nbsp;to&nbsp;be&nbsp;prudent,&nbsp;responsible,&nbsp;and&nbsp;visionary&nbsp;when&nbsp;approaching&nbsp;cybersecurity,&nbsp;we&nbsp;are&nbsp;at&nbsp;most&nbsp;risk&nbsp;of&nbsp;what&nbsp;we&nbsp;do&nbsp;not&nbsp;see and anticipate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Discussion Board: From Verbeek&#8217;s writing (Mod 6, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation<\/h3>\n\n\n\n<p>As technology advances, the world is transforming in enormous ways. The day-to-day items like phones, vehicles, and even home appliances are internet-based and can make smart choices. This phenomenon is known as intelligification, and it just means that technology is starting to impact our choices. At the same time, governments are increasingly unable to keep up with everything and cannot control everything. Therefore, we need new mechanisms to make sure that companies, online communities, and individuals use technology in a safe and fair manner.&nbsp;Companies and markets need to be held responsible for integrating safety and fairness into their products. Smart cars, for example, should automatically follow regulations. Online communities need to work together to stop harmful activity and the spread of disinformation. And individuals have to be careful how they employ technology and release information. Where everything is integrated and the government cannot do everything, everyone has to help safeguard others and be responsible using technology.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Journal Entry 1: The NICE Workforce Framework<\/strong><\/h3>\n\n\n\n<p>Having learned about the NICE Workforce Framework, the area that I would like to<br>specialize in my career is Program\/Project Management. I like this area because it involves<br>planning, organizing, and ensuring that projects are completed successfully. Leadership and<br>team management are strengths that I enjoy, and project management would allow me to apply<br>these abilities to manage individuals and keep things in motion. My least favorite field is Design<br>and Development. Even though I realize it&#8217;s important to create systems and tools, I&#8217;m less<br>interested in the technical process of creating software or in programming. I would prefer to<br>concentrate on planning and project management as opposed to designing or programming.<br>In general, I am most drawn towards the management facet of cybersecurity, where I get to<br>combine leadership and safety, and least drawn towards the technical development and design<br>end.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Journal Entry 2: How does the principle of empiricism enhance the effectiveness of cybersecurity practices?<\/h3>\n\n\n\n<p>The empiricism principle helps to support cybersecurity by utilizing tangible evidence for decision making as opposed to speculation. By collecting data and analyzing past attacks, organizations are able to anticipate attack k patterns and emerging threats before they spread. Empirical data also allows security teams to experiment and measure the effectiveness of existing defenses rather than speculate. For example, logs and intrusion attempts can be used to detect vulnerabilities that have not been encountered before. This empirical approach signifies that the strategies are continually being revised to address evolving threats. Overall, empiricism enhances cybersecurity as it makes it proactive, responsive, and based on tested outcomes instead of speculation<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Journal Entry 3: Research PrivacyRights.org to&nbsp;see the types of publicly available information&nbsp;about data breaches. How might researchers use this information to&nbsp;study breaches and forecast future data breach trends?&nbsp;<\/strong><\/h3>\n\n\n\n<p>PrivacyRights.org&#8217;s &#8220;Data Breach Chronology&#8221; contains publicly accessible data such as the number of records leaked, the type of information leaked, like names, addresses, and Social Security numbers, date of data breach, organization, and how the breach was done. Analysts can then use that data to identify trends over time, like which industries are hit hardest, what kind of information is most frequently targeted, or which kinds of breaches are increasing. From those trends, they can forecast where breaches will increase, inform policy recommendations, and help organizations gauge and maximize security spending<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">CYSE 201S \u2013 Cybersecurity and the Social Sciences<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Article Reviews <\/strong><\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Article-1-review-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-1-review-2.\"><\/object><a id=\"wp-block-file--media-2e349bd2-3e5d-4922-b1fd-ad81f6d59a69\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Article-1-review-2.pdf\">Article-1-review-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Article-1-review-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2e349bd2-3e5d-4922-b1fd-ad81f6d59a69\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Article-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-2-1.\"><\/object><a id=\"wp-block-file--media-ad61076c-7dc9-4acf-b856-e6d16ab9303e\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Article-2-1.pdf\">Article-2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Article-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ad61076c-7dc9-4acf-b856-e6d16ab9303e\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Career paper<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/carreer-paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of carreer-paper.\"><\/object><a id=\"wp-block-file--media-ac2a6b36-ccf3-4394-b21c-0474639224fb\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/carreer-paper.pdf\">carreer-paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/carreer-paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ac2a6b36-ccf3-4394-b21c-0474639224fb\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity and social science presentation video <\/h2>\n\n\n\n<p><a href=\"https:\/\/cdn.inst-fs-iad-prod.inscloudgate.net\/b898777e-fe78-438b-ba6b-453b46051827\/1764728175.557702.MOV?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii9iODk4Nzc3ZS1mZTc4LTQzOGItYmE2Yi00NTNiNDYwNTE4MjcvMTc2NDcyODE3NS41NTc3MDIuTU9WIiwidGVuYW50IjoiY2FudmFzIiwiaWF0IjoxNzY1ODE1OTExLCJleHAiOjE3NjU5MDIzMTEsImp0aSI6IjBlODI0YzA4LTgwYmYtNGE1MC05MjFjLWU3ZTg3ODJmOGY4MSJ9.Gec7Mp4UugfVcw4cRhHxg8Lt71YvY2U0qo414pWJI94_9HB8po5Ic5S1lLNYScb3Xv8JwzVgTwzJxv-nLnfMqg&amp;download=1&amp;content_type=video%2Fquicktime\">https:\/\/cdn.inst-fs-iad-prod.inscloudgate.net\/b898777e-fe78-438b-ba6b-453b46051827\/1764728175.557702.MOV?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii9iODk4Nzc3ZS1mZTc4LTQzOGItYmE2Yi00NTNiNDYwNTE4MjcvMTc2NDcyODE3NS41NTc3MDIuTU9WIiwidGVuYW50IjoiY2FudmFzIiwiaWF0IjoxNzY1ODE1OTExLCJleHAiOjE3NjU5MDIzMTEsImp0aSI6IjBlODI0YzA4LTgwYmYtNGE1MC05MjFjLWU3ZTg3ODJmOGY4MSJ9.Gec7Mp4UugfVcw4cRhHxg8Lt71YvY2U0qo414pWJI94_9HB8po5Ic5S1lLNYScb3Xv8JwzVgTwzJxv-nLnfMqg&amp;download=1&amp;content_type=video%2Fquicktime<\/a><\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">202510_CYSE270_17238 LINUX SYSTEM FOR CYBERSECURITY<\/h2>\n\n\n\n<p>Assignment 1&nbsp;Install Linux VM: The installation of the Linux virtual machine was quite challenging and interesting at the same time. At first, I wasn&#8217;t sure what to expect because Linux looks somewhat different from what I am normally exposed to, for instance, Windows. Setting up the VM has taught me how following each step to the letter is crucial, especially in selecting appropriate settings and storage. Once Linux finally loaded, I realized just how powerful this platform truly is and why many people use it for cybersecurity and programming.<\/p>\n\n\n\n<p>Assignment 2 Working with Command Line: Of all the things that I&#8217;ve learned in Linux so far, working with the vi editor has been one of the more difficult concepts. I didn&#8217;t understand how it worked at first, since it&#8217;s not based on a normal mouse or simple menus. You need to know certain keys to switch between modes, insert text, and save your work. It was confusing at first to learn the difference between insert mode and command mode; after practice, though, it started to make more sense.<\/p>\n\n\n\n<p>Assignment 3 Working with vi editor: Working in the vi editor is an experience that requires some patience. At first, it was frustrating because vi isn&#8217;t like normal text editors; you can&#8217;t just start typing. You have to know what mode you are in: insert mode or command mode. I had to memorize commands just to save, quit, or delete a line.<\/p>\n\n\n\n<p>Assignment 4 &#8211; Group and User Management: Learning about the management of groups and users in Linux showed me just how vital organization and security are in an operating system. I never realized how many roles users could take up or how permissions determined what people could do on a computer. Exploring using the commands useradd, groupadd, passwd, and usermod showed me how administrators keep systems safe by giving the right access to the right people.<\/p>\n\n\n\n<p>assignment 5 Password Cracking: Learning password cracking really made me understand how important strong security is. I did not realize at first how easy it can be to crack weak passwords using tools or simple guessing. When I saw the speed at which computers test thousands of passwords, that made me understand why people should avoid simple words, birthdays, or short passwords.<\/p>\n\n\n\n<p>assignment 6 File Permissions: Working on Assignment 6 about file permissions really helped me understand how Linux controls who can read, write, or execute a file. I have to say, at first, the permission numbers and letters confused me; for instance, when I saw such things as rwx and chmod 755. However, with practice, I learned what each of these symbols means and how these permissions affect security. For example, giving everyone write access can be dangerous, while limiting permissions helps protect important files.<\/p>\n\n\n\n<p>assignment 7 Storage Management: Storage management, Assignment 7, helped me to understand how Linux arranges and manages the different parts of the storage of a computer. Previously, I had little idea of what partitions, file systems, or mounting meant. Learning the usage of commands such as fdisk, df -h, and mount showed me how the system keeps track of space and where files are stored<\/p>\n\n\n\n<p>assignment 8 Scripting:  on shell scripting did teach me how powerful automation could be in Linux. At the very start, writing a script was confusing since one has to be careful with every symbol, space, and command. But then, after I understood the structure, like starting with #!\/bin\/bash and making the script executable, it started to make more sense. More important, I found that variables, loops, and simple commands together are enough to accomplish some tasks automatically instead of manually typing everything.<\/p>\n\n\n\n<p>assignment 9 Learning about the automation of tasks showed me how much easier and faster work can get when one lets the computer do the repetitive work. At first, I didn&#8217;t realize how many things could be automated, like backups, updates, or even checking system status. Utilizing tools such as shell scripts and cron jobs really helped me to see how automation keeps systems running smoothly without someone having to sit there and do everything manually.<\/p>\n\n\n\n<p>assignment 10 The networking basics helped me to understand how computers communicate with one another. I really didn&#8217;t understand terms such as IP address, subnet mask, or default gateway before this topic. After working through the lessons and practicing commands like ifconfig, ping, and netstat, I learned how each part plays a role in sending and receiving information across a network and how networks are set up along with how to troubleshoot connection problems.<\/p>\n\n\n\n<p>assignment 11 Learning network configuration really allowed me to understand how computers actually connect to a network and communicate correctly. I had never known how important the settings of IP addresses, DNS servers, and gateways were until this lesson. When I started to configure them myself, I noticed that even one mistake simply stopped the whole connection from working. Executing commands like ifconfig, ip addr, and ping showed me how to check network settings and test whether the system was communicating properly.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Lab-11-Network-Basics-Configuration.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-11-Network-Basics-Configuration.\"><\/object><a id=\"wp-block-file--media-f7463ae2-ede2-4b96-8c9f-576515b92085\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Lab-11-Network-Basics-Configuration.pdf\">Lab-11-Network-Basics-Configuration<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Lab-11-Network-Basics-Configuration.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f7463ae2-ede2-4b96-8c9f-576515b92085\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/linux-systems-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of linux-systems-2.\"><\/object><a id=\"wp-block-file--media-9f987dcd-8d4d-4c7d-9d7e-0e5d90502fcb\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/linux-systems-2.pdf\">linux-systems-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/linux-systems-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9f987dcd-8d4d-4c7d-9d7e-0e5d90502fcb\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Assignment-10-Networking-Basics-and-Subnetting.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-10-Networking-Basics-and-Subnetting.\"><\/object><a id=\"wp-block-file--media-9dd6475e-1406-4d6f-b36c-8e2bc60f8dad\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Assignment-10-Networking-Basics-and-Subnetting.pdf\">Assignment-10-Networking-Basics-and-Subnetting<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Assignment-10-Networking-Basics-and-Subnetting.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9dd6475e-1406-4d6f-b36c-8e2bc60f8dad\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/assignment-9.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of assignment-9.\"><\/object><a id=\"wp-block-file--media-50f55776-21b9-41c5-9388-7fd6d8c2f185\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/assignment-9.pdf\">assignment-9<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/assignment-9.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-50f55776-21b9-41c5-9388-7fd6d8c2f185\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Lab-6-\u2013-File-Permission.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-6-\u2013-File-Permission.\"><\/object><a id=\"wp-block-file--media-10a74f19-5620-4197-bed8-579d50121740\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Lab-6-\u2013-File-Permission.pdf\">Lab-6-\u2013-File-Permission<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Lab-6-\u2013-File-Permission.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-10a74f19-5620-4197-bed8-579d50121740\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Assignment-7-Storage-Management.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-7-Storage-Management.\"><\/object><a id=\"wp-block-file--media-50e4eb86-2777-47bd-9714-fb4e153bdfb2\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Assignment-7-Storage-Management.pdf\">Assignment-7-Storage-Management<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/Assignment-7-Storage-Management.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-50e4eb86-2777-47bd-9714-fb4e153bdfb2\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/CYSE-270-Assignment-lab-1-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-270-Assignment-lab-1-.\"><\/object><a id=\"wp-block-file--media-8dd71419-099b-4a08-89e6-16d9330242a3\" href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/CYSE-270-Assignment-lab-1-.pdf\">CYSE-270-Assignment-lab-1-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-content\/uploads\/sites\/37298\/2025\/12\/CYSE-270-Assignment-lab-1-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8dd71419-099b-4a08-89e6-16d9330242a3\">Download<\/a><\/div>\n\n\n\n<!--nextpage-->\n\n\n\n<!--nextpage-->\n\n\n\n<!--nextpage-->\n","protected":false},"excerpt":{"rendered":"<p>This is a bit about me! My name is Corey, and I am a 19-year-old sophomore at ODU. I enjoy music, exercise, and overall having a good time! Cybersecurity interests me because it is still a relatively new area, and I have always been intrigued by technology. It would be nice to enter a career&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/coreystokes3\/\">Read More<\/a><\/div>\n","protected":false},"author":29817,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-json\/wp\/v2\/users\/29817"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-json\/wp\/v2\/pages\/120\/revisions\/330"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/coreystokes3\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}