{"id":133,"date":"2025-09-29T14:22:26","date_gmt":"2025-09-29T14:22:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-12-02T03:56:23","modified_gmt":"2025-12-02T03:56:23","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<p>BLUF: This ePortfolio showcases my development in understanding cybersecurity as an interdisciplinary field by highlighting key assignments that examine human behavior, organizational culture, technical security foundations, and leadership perspectives. The included work demonstrates my ability to connect course concepts, such as the CIA Triad, insider risk, sociotechnical vulnerabilities, and data-driven decision making, to real cybersecurity challenges, aligning directly with CYSE 200T learning objectives. These write-ups represent my growth in understanding how cybersecurity challenges emerge, how they affect individuals and organizations, and how thoughtful, informed strategies can strengthen security across both technological and human domains.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/Write-up_-The-CIA-Triad.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-up_-The-CIA-Triad.\"><\/object><a id=\"wp-block-file--media-647c2607-de19-4aa5-b6d2-c8cc6b778431\" href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/Write-up_-The-CIA-Triad.pdf\">Write-up_-The-CIA-Triad<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/Write-up_-The-CIA-Triad.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-647c2607-de19-4aa5-b6d2-c8cc6b778431\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/Data-Center-ICA-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Data-Center-ICA-1.\"><\/object><a id=\"wp-block-file--media-60078d9d-632a-43ec-a7be-5a28cb2e66a7\" href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/Data-Center-ICA-1.pdf\">Data-Center-ICA-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/Data-Center-ICA-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-60078d9d-632a-43ec-a7be-5a28cb2e66a7\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/The-Human-Factor-in-Cybersecurity-Write-up.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-Human-Factor-in-Cybersecurity-Write-up.\"><\/object><a id=\"wp-block-file--media-491a20fd-8565-4365-ab66-a15326a87fe1\" href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/The-Human-Factor-in-Cybersecurity-Write-up.pdf\">The-Human-Factor-in-Cybersecurity-Write-up<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/The-Human-Factor-in-Cybersecurity-Write-up.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-491a20fd-8565-4365-ab66-a15326a87fe1\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/LCDR-Green-Write-Up.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of LCDR-Green-Write-Up.\"><\/object><a id=\"wp-block-file--media-4d7642d5-7a3f-4f25-b457-090e9aa35ad0\" href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/LCDR-Green-Write-Up.pdf\">LCDR-Green-Write-Up<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-content\/uploads\/sites\/40011\/2025\/12\/LCDR-Green-Write-Up.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4d7642d5-7a3f-4f25-b457-090e9aa35ad0\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>BLUF: This ePortfolio showcases my development in understanding cybersecurity as an interdisciplinary field by highlighting key assignments that examine human behavior, organizational culture, technical security foundations, and leadership perspectives. The included work demonstrates my ability to connect course concepts, such as the CIA Triad, insider risk, sociotechnical vulnerabilities, and data-driven decision making, to real cybersecurity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse200t20930\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":22238,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-json\/wp\/v2\/users\/22238"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-json\/wp\/v2\/pages\/133\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t20930\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}