{"id":530,"date":"2026-04-25T17:38:41","date_gmt":"2026-04-25T17:38:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-201s\/?p=530"},"modified":"2026-04-25T18:33:16","modified_gmt":"2026-04-25T18:33:16","slug":"cybersecurity-policy-analysis-evaluating-the-nist-cybersecurity-framework","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/cybersecurity-policy-analysis-evaluating-the-nist-cybersecurity-framework\/","title":{"rendered":"Cybersecurity Policy Analysis: Evaluating the NIST Cybersecurity Framework"},"content":{"rendered":"\n<p><strong>Research Paper \u2013 Evaluating the Effectiveness of the NIST Cybersecurity Framework<\/strong><br><\/p>\n\n\n\n<p>I examined how the NIST Cybersecurity Framework is applied in real organizations and how effectively it supports risk management and incident response.<\/p>\n\n\n\n<p>The focus was on how the framework helps structure security practices and reduce vulnerabilities, while also looking at how different organizations implement it in practice. This made it possible to identify both its strengths and the areas where there are still limitations.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2026\/04\/annotated-Policy20Analysis20Paper205.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-content\/uploads\/sites\/35301\/2026\/04\/annotated-Policy20Analysis20Paper205.pdf\" class=\"wp-block-file__button wp-element-button\" download>Download<\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research Paper \u2013 Evaluating the Effectiveness of the NIST Cybersecurity Framework I examined how the NIST Cybersecurity Framework is applied in real organizations and how effectively it supports risk management and incident response. The focus was on how the framework&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/cybersecurity-policy-analysis-evaluating-the-nist-cybersecurity-framework\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25880,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/530"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/users\/25880"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/comments?post=530"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/530\/revisions"}],"predecessor-version":[{"id":562,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/530\/revisions\/562"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/media?parent=530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/categories?post=530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/tags?post=530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}