{"id":327,"date":"2024-10-17T16:30:52","date_gmt":"2024-10-17T16:30:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/?page_id=327"},"modified":"2024-10-17T17:38:59","modified_gmt":"2024-10-17T17:38:59","slug":"cybersecurity-policy","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/cybersecurity-policy\/","title":{"rendered":"Cybersecurity Policy"},"content":{"rendered":"\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-content\/uploads\/sites\/22733\/2024\/10\/CS465_Project-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CS465_Project-1.\"><\/object><a id=\"wp-block-file--media-3d9b7392-4dd4-4c21-a5b2-b18e18289d23\" href=\"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-content\/uploads\/sites\/22733\/2024\/10\/CS465_Project-1.pdf\">CS465_Project-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-content\/uploads\/sites\/22733\/2024\/10\/CS465_Project-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3d9b7392-4dd4-4c21-a5b2-b18e18289d23\">Download<\/a><\/div>\n\n\n\n<p>ABC Inc., is a fictional company that fell victim to a cyberattack. The attack left critical network infrastructure inaccessible and inoperable for days. As the new CTO of ABC INC, my objective was to analyze current company IT protocol and implement new cybersecurity plans using graphs and other visuals for support. A threat matrix, vulnerability assessment, and communications plan was introduced to further support reccomendations.  <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-content\/uploads\/sites\/22733\/2024\/10\/annotated-Research_Paper_Part1_IT150G-1.docx-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Research_Paper_Part1_IT150G-1.docx-1.\"><\/object><a id=\"wp-block-file--media-4c5b27ac-6630-4a0e-b1d6-2095d99a5b99\" href=\"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-content\/uploads\/sites\/22733\/2024\/10\/annotated-Research_Paper_Part1_IT150G-1.docx-1.pdf\">annotated-Research_Paper_Part1_IT150G-1.docx-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-content\/uploads\/sites\/22733\/2024\/10\/annotated-Research_Paper_Part1_IT150G-1.docx-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4c5b27ac-6630-4a0e-b1d6-2095d99a5b99\">Download<\/a><\/div>\n\n\n\n<p>This IT project demonstrates my ability to research critical topics in Cybersecurity. My topic was the use of cell phones in cybersecurity and the effects of increase technology use.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ABC Inc., is a fictional company that fell victim to a cyberattack. The attack left critical network infrastructure inaccessible and inoperable for days. As the new CTO of ABC INC, my objective was to analyze current company IT protocol and implement new cybersecurity plans using graphs and other visuals for support. A threat matrix, vulnerability &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/drjcyber2020\/cybersecurity-policy\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cybersecurity Policy<\/span><\/a><\/p>\n","protected":false},"author":17364,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-json\/wp\/v2\/pages\/327"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-json\/wp\/v2\/users\/17364"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-json\/wp\/v2\/pages\/327\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-json\/wp\/v2\/pages\/327\/revisions\/346"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/drjcyber2020\/wp-json\/wp\/v2\/media?parent=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}