{"id":33,"date":"2025-04-30T19:20:34","date_gmt":"2025-04-30T19:20:34","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=33"},"modified":"2025-05-05T03:15:53","modified_gmt":"2025-05-05T03:15:53","slug":"academics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/academics\/","title":{"rendered":"Cybersecurity Principles: Core Topics"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Mobile Device Security <\/h2>\n\n\n\n<p class=\"has-medium-font-size\">As mobile devices such as phones, smart watches, tablets, and other related gear have become more pertinent in the modern cybersecurity landscape, for both personal and business use, it is equally important to protect these machines with the same level of care as traditional, non-mobile systems have been in the past. With these tools being an essential part of daily communication, work, data storage, and more, these devices have become increasingly more target by malicious actors. Mobile Device Security as a cybersecurity concept involves protecting mobile devices against threats such as malware, phishing \/ vishing attempts, SIM swapping, and other various forms of attacks that would negatively impact both an organization or individual who is affected. Strategies formed to protect against these threats include multi-factor authentication (MFA), mobile antivirus software, accessing sensitive or work material through a Virtual Private Network (VPN), only connecting to trusted and known WiFi, using biometric based authentication (something you are), automatic software updates, and more. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/Mobile-Device-Protection-Infographic-Website.png\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"956\" src=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/Mobile-Device-Protection-Infographic-Website.png\" alt=\"\" class=\"wp-image-270\" style=\"width:624px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/Mobile-Device-Protection-Infographic-Website.png 800w, https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/Mobile-Device-Protection-Infographic-Website-251x300.png 251w, https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/Mobile-Device-Protection-Infographic-Website-768x918.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Identity &amp; Access Management (IAM)<\/h2>\n\n\n\n<p>Identity &amp; Access Management (IAM) is an approach and framework centered around ensuring that only authorized individuals, pre-defined groups, and roles can access the desired resources at the correct time. This policy helps to protect organizations and agencies from insider threats, unauthorized access to material, data breaches, and overall helps to reduce the risk faced by an entity by protecting the integrity of their systems and data. IAM does not stand alone, as it is influenced by and works alongside various government regulated compliances such as HIPPA or GDPR to ensure compliance with access to data and how it is stored. Some features of Identity &amp; Access Management include <strong><span style=\"text-decoration: underline\">multi-factor authentication<\/span><\/strong> to protect against unauthorized access even in cases where a malicious attacker have obtained a password, <strong><span style=\"text-decoration: underline\">Role-Based Access Control (RBAC<\/span><\/strong>) to limit those with a certain role to only be able to access the bare-minimum of necessary information in order to complete their job, as well as enforcing strong <strong><span style=\"text-decoration: underline\">password policies<\/span><\/strong> to help prevent successful password based attacks. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/identity-access-mgmt-slide6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/identity-access-mgmt-slide6.png\" alt=\"\" class=\"wp-image-292\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/identity-access-mgmt-slide6.png 960w, https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/identity-access-mgmt-slide6-300x169.png 300w, https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/identity-access-mgmt-slide6-768x432.png 768w, https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/identity-access-mgmt-slide6-533x300.png 533w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability Management <\/h2>\n\n\n\n<p>Vulnerability Management is an ongoing process in which businesses, organizations, and various entities continuously identify, prioritize, and remediate vulnerabilities in an effort to mitigate the overall risk faced across the groups attack surface. When done correctly, vulnerability management will minimize the possibility of a successful attack and allows the IT team to have a clear view of the systems, software, prioritizations, and policies in place that are being constantly monitored by automated processes alongside manual ones as well. Some examples of the tools, software, and processes used during vulnerability management include:<\/p>\n\n\n\n<ol>\n<li>Nessus<\/li>\n\n\n\n<li>OpenVAS<\/li>\n\n\n\n<li>VPR <\/li>\n\n\n\n<li>Ivanti<\/li>\n\n\n\n<li>Microsoft Defend Vulnerability Management <\/li>\n<\/ol>\n\n\n\n<p><strong><span style=\"text-decoration: underline\">The Vulnerability Management lifecycle is displayed below:<\/span><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"628\" src=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/image-1.png\" alt=\"\" class=\"wp-image-301\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/image-1.png 776w, https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/image-1-300x243.png 300w, https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/image-1-768x622.png 768w, https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-content\/uploads\/sites\/39047\/2025\/05\/image-1-371x300.png 371w\" sizes=\"(max-width: 776px) 100vw, 776px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Mobile Device Security As mobile devices such as phones, smart watches, tablets, and other related gear have become more pertinent in the modern cybersecurity landscape, for both personal and business use, it is equally important to protect these machines with the same level of care as traditional, non-mobile systems have been in the past. With&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/academics\/\">Read More<\/a><\/div>\n","protected":false},"author":27609,"featured_media":331,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/pages\/33"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/users\/27609"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/pages\/33\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/pages\/33\/revisions\/302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/media\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600showcasewyattblevins\/wp-json\/wp\/v2\/media?parent=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}