{"id":33,"date":"2025-12-02T00:09:59","date_gmt":"2025-12-02T00:09:59","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=33"},"modified":"2025-12-02T01:01:22","modified_gmt":"2025-12-02T01:01:22","slug":"academics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse200t\/academics\/","title":{"rendered":"Write Ups"},"content":{"rendered":"\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/65e04734-5881-4655-94e2-c487e7ff2971.usrfiles.com\/ugd\/65e047_d29dc46a890942eeb80b5914ad7057b8.pdf\">Cyber Roles and Responsibilities<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/65e04734-5881-4655-94e2-c487e7ff2971.usrfiles.com\/ugd\/65e047_4d0c47f80f944597a23933ad5b802857.pdf\">SCADA Systems<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/65e04734-5881-4655-94e2-c487e7ff2971.usrfiles.com\/ugd\/65e047_28cdf26fcab746a482f9eb62206400e3.pdf\">Human Factors<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/65e04734-5881-4655-94e2-c487e7ff2971.usrfiles.com\/ugd\/65e047_0de4d303e8b5464a9e87a17efc0b2c67.pdf\">Exploring Attacks on Availability<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/65e04734-5881-4655-94e2-c487e7ff2971.usrfiles.com\/ugd\/65e047_e9762bb94dc0451782e9f87725ea78d9.pdf\">The CIA Triad<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/65e04734-5881-4655-94e2-c487e7ff2971.usrfiles.com\/ugd\/65e047_6ec200acae0e4701a3cdd1d07a11ac39.pdf\">Hacking Humans<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/65e04734-5881-4655-94e2-c487e7ff2971.usrfiles.com\/ugd\/65e047_6d6a47a02fed4d5bba5833dafa65e84b.pdf\">Creating Cybersecurity Policies<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":31512,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t\/wp-json\/wp\/v2\/pages\/33"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t\/wp-json\/wp\/v2\/users\/31512"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse200t\/wp-json\/wp\/v2\/pages\/33\/revisions"}],"predecessor-version":[{"id":253,"href":"https:\/\/sites.wp.odu.edu\/cyse200t\/wp-json\/wp\/v2\/pages\/33\/revisions\/253"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t\/wp-json\/wp\/v2\/media?parent=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}