{"id":310,"date":"2024-12-06T19:05:28","date_gmt":"2024-12-06T19:05:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dshul\/?page_id=310"},"modified":"2024-12-06T19:05:30","modified_gmt":"2024-12-06T19:05:30","slug":"cyse200","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dshul\/cyse200\/","title":{"rendered":"CYSE200"},"content":{"rendered":"\n<p>As a Freshman Monarch at ODU, CYSE200, or Cybersecurity Technology and Society. Professor Charlie Kirkpatrick was great with class engagement, which helped me learn. He taught us the social aspect of cyber and how it contributes to the business world. I&#8217;ve included 3 of the assignments that we did in the semester to include in this portfolio.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ol>\n<li>Write Up- SCADA Systems <\/li>\n<\/ol>\n\n\n\n<p>Details :In this write-up you will use the\u00a0<a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">SCADA SystemsLinks to an external site.<\/a>\u00a0article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dshul\/wp-content\/uploads\/sites\/37354\/2024\/12\/SCADA-Systems-Write-up.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SCADA-Systems-Write-up.\"><\/object><a id=\"wp-block-file--media-3317e20a-ff77-47e9-b735-9fbbc41d1b32\" href=\"https:\/\/sites.wp.odu.edu\/dshul\/wp-content\/uploads\/sites\/37354\/2024\/12\/SCADA-Systems-Write-up.pdf\">SCADA-Systems-Write-up<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dshul\/wp-content\/uploads\/sites\/37354\/2024\/12\/SCADA-Systems-Write-up.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3317e20a-ff77-47e9-b735-9fbbc41d1b32\">Download<\/a><\/div>\n\n\n\n<p>2. Write-up The CIA Triad:<\/p>\n\n\n\n<ul>\n<li>Details: Using the\u00a0<a href=\"https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">Chai Article\u00a0(Links to an external site.)<\/a>, along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication &amp; Authorization, including an example.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dshul\/wp-content\/uploads\/sites\/37354\/2024\/12\/The-CIA-Triad-Write-up.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-CIA-Triad-Write-up.\"><\/object><a id=\"wp-block-file--media-94cb8537-c0b0-4d70-b052-96771543ab6e\" href=\"https:\/\/sites.wp.odu.edu\/dshul\/wp-content\/uploads\/sites\/37354\/2024\/12\/The-CIA-Triad-Write-up.pdf\">The-CIA-Triad-Write-up<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dshul\/wp-content\/uploads\/sites\/37354\/2024\/12\/The-CIA-Triad-Write-up.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-94cb8537-c0b0-4d70-b052-96771543ab6e\">Download<\/a><\/div>\n\n\n\n<p>3. Opportunities for Workplace Devience:<\/p>\n\n\n\n<ul>\n<li>Details: In this assignment we had to write about how cyber has created opportunities for Workplace Devience.<\/li>\n<\/ul>\n\n\n\n<p>My reply: <\/p>\n\n\n\n<p><a href=\"https:\/\/canvas.odu.edu\/courses\/161699\/users\/95141\">DREAH SHULER<\/a><\/p>\n\n\n\n<p>There has been a growing reliance on digital materials in workplaces, schools, businesses, etc., and now most things are digital or technology-based. In workplaces, people access what they are supposed to, to do their jobs. Deviance may come into question if someone is doing things they shouldn&#8217;t without being noticed immediately. They may access things that shouldn&#8217;t, breach unauthorized things, or ignore rules and protocols altogether, especially dealing with sensitive information, harming consumers or the organization.<\/p>\n\n\n\n<p>This class helped me look at Cybersecurity a different way. Professor Kirkpatrick help me understand that it&#8217;s more than protecting and understanding systems but also understanding how critical it is to other places.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a Freshman Monarch at ODU, CYSE200, or Cybersecurity Technology and Society. Professor Charlie Kirkpatrick was great with class engagement, which helped me learn. He taught us the social aspect of cyber and how it contributes to the business world. I&#8217;ve included 3 of the assignments that we did in the semester to include in [&hellip;]<\/p>\n","protected":false},"author":29854,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dshul\/wp-json\/wp\/v2\/pages\/310"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dshul\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dshul\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dshul\/wp-json\/wp\/v2\/users\/29854"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dshul\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dshul\/wp-json\/wp\/v2\/pages\/310\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/sites.wp.odu.edu\/dshul\/wp-json\/wp\/v2\/pages\/310\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dshul\/wp-json\/wp\/v2\/media?parent=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}