{"id":404,"date":"2026-05-05T21:33:15","date_gmt":"2026-05-05T21:33:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201sna\/?page_id=404"},"modified":"2026-05-06T03:05:10","modified_gmt":"2026-05-06T03:05:10","slug":"ai-soc-assistant-project","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201sna\/ai-soc-assistant-project\/","title":{"rendered":"AI SOC Assistant Project"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"639\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/SOC-Assistant-1024x639.png\" alt=\"\" class=\"wp-image-454\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/SOC-Assistant-1024x639.png 1024w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/SOC-Assistant-300x187.png 300w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/SOC-Assistant-768x479.png 768w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/SOC-Assistant-1536x958.png 1536w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/SOC-Assistant-2048x1278.png 2048w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/SOC-Assistant-481x300.png 481w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This project is an AI assistant built specifically for security analysts to get fast, reliable answers during real incidents. Instead of generating generic AI responses, it pulls directly from approved cybersecurity documentation like NIST, CISA, and MITRE ATT&amp;CK, so every answer is grounded in actual policy and procedures rather than guesswork.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This project is an AI assistant built specifically for security analysts to get fast, reliable answers during real incidents. Instead of generating generic AI responses, it pulls directly from approved cybersecurity documentation like NIST, CISA, and MITRE ATT&amp;CK, so every answer is grounded in actual policy and procedures rather than guesswork.<\/p>\n","protected":false},"author":25959,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/404"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/users\/25959"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/comments?post=404"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/404\/revisions"}],"predecessor-version":[{"id":455,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/404\/revisions\/455"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/media?parent=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}