{"id":125,"date":"2023-07-29T08:58:18","date_gmt":"2023-07-29T08:58:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=125"},"modified":"2023-08-02T16:25:40","modified_gmt":"2023-08-02T16:25:40","slug":"cyse-406","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hbramow\/cyse-406\/","title":{"rendered":"CYSE 406 &#8211; Cyber Law"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center has-pale-ocean-gradient-background has-background\">Cyber Law<\/h1>\n\n\n\n<ul>\n<li>This Cyber Law class offers a broad knowledge of constitutional, civil, criminal, and related legal considerations that arise in the context of work or citizenship in an increasingly cyber and digital world.&nbsp; &nbsp;<\/li>\n\n\n\n<li>It is beneficial whether I decide to see public work or private industry work, because it helps with gaining insights into limits and authorities on government or private sector activities.&nbsp; <\/li>\n\n\n\n<li>This also includes the creation and protection of intellectual property, to the investigation of unlawful cyber activities, to the considerations of cyber operations in an increasingly dangerous world.&nbsp; <\/li>\n\n\n\n<li>The broadened awareness helps to navigate and strengthen both my personal and professional choices now and in the future.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Course Material<\/h1>\n\n\n\n<ul>\n<li>The textbook for this class was &#8220;Cybersecurity and Privacy Law in a Nutshell&#8221; by Kenan and Hayes.<\/li>\n\n\n\n<li>There were also many videos and pdf documents to study from too.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Discussions<\/h2>\n\n\n\n<ul>\n<li>Below are several discussions posted in this class.<\/li>\n\n\n\n<li>My final project for the course, which was to be a memo to the Governor of a small country regarding recommendations for a private data policy, is an attachment to this page.&nbsp; They were lacking any regulations and this is an analysis of some current privacy legislation and regulations in nearby areas.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><strong>Discussion Board 4 &#8211; Use of a government-coordinated intrusion-prevention system on private networks<\/strong><\/p>\n\n\n\n<p>Jack Goldsmith\u2019s 2010 essay,&nbsp;<em>The Cyberthreat, Government Network Operations, and the Fourth Amendment<\/em>&nbsp;is an assigned reading for Module 11. In his essay, he discusses the possibility of the Federal government mandating the use of a government-coordinated intrusion-prevention system to monitor&nbsp;<strong>all&nbsp;<\/strong>communications throughout networks in the United States, including private ones. Such monitoring, Goldsmith argues, is required to protect the U.S. against malicious cyber actors \u2013 and possibly a real cyber-attack.<\/p>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=http%3A%2F%2Fsites.wp.odu.edu%2Fhbramow%2Fwp-content%2Fuploads%2Fsites%2F33714%2F2023%2F08%2FCYSE-406-Disc.-4-Intrusion-Prevention-System.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=http%3A%2F%2Fsites.wp.odu.edu%2Fhbramow%2Fwp-content%2Fuploads%2Fsites%2F33714%2F2023%2F08%2FCYSE-406-Disc.-4-Intrusion-Prevention-System.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"703\" height=\"1024\" src=\"http:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/08\/law-pexels-sora-shimazaki-5669602-703x1024.jpg\" alt=\"\" class=\"wp-image-530\" srcset=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/08\/law-pexels-sora-shimazaki-5669602-703x1024.jpg 703w, https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/08\/law-pexels-sora-shimazaki-5669602-206x300.jpg 206w, https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/08\/law-pexels-sora-shimazaki-5669602-768x1119.jpg 768w, https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/08\/law-pexels-sora-shimazaki-5669602-1054x1536.jpg 1054w, https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/08\/law-pexels-sora-shimazaki-5669602.jpg 1280w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Law Course Material Discussions Discussion Board 4 &#8211; Use of a government-coordinated intrusion-prevention system on private networks Jack Goldsmith\u2019s 2010 essay,&nbsp;The Cyberthreat, Government Network Operations, and the Fourth Amendment&nbsp;is an assigned reading for Module 11. In his essay, he discusses the possibility of the Federal government mandating the use of a government-coordinated intrusion-prevention system&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/hbramow\/cyse-406\/\">Read More<\/a><\/div>\n","protected":false},"author":27054,"featured_media":530,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/125"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/users\/27054"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/125\/revisions"}],"predecessor-version":[{"id":531,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/125\/revisions\/531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/media\/530"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/media?parent=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}