{"id":152,"date":"2023-02-02T21:33:42","date_gmt":"2023-02-02T21:33:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=152"},"modified":"2025-04-23T16:37:52","modified_gmt":"2025-04-23T16:37:52","slug":"cyse-525","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ismael200t\/cyse-525\/","title":{"rendered":"CYSE 525"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Strategy and Policy<\/h1>\n<p class=\"p1\">This course introduces me to the importance that cybersecurity strategy and policy, possess within the digital realm. This includes how cybersecurity strategy and policy, are essential for protecting sensitive information from unauthorized access, and continuing business objectives. This course also explored the political implications, that arise from the strategy or policy selected, the ethical implications, the social implications, and the full accessing of the policy or strategy chosen effectiveness.\u00a0<\/p>\n<h2 class=\"p1\">Political implications of GDPR Paper:\u00a0 \u00a0 \u00a0 \u00a0<\/h2>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Anaylsis20paper202-20Sahmer20Ismael.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Policy20Anaylsis20paper202-20Sahmer20Ismael.\"><\/object><a id=\"wp-block-file--media-618eb3ec-0917-4d30-9ed0-5a516c87c526\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Anaylsis20paper202-20Sahmer20Ismael.pdf\">annotated-Policy20Anaylsis20paper202-20Sahmer20Ismael<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Anaylsis20paper202-20Sahmer20Ismael.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-618eb3ec-0917-4d30-9ed0-5a516c87c526\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Social Implications of GDPR Paper:<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Analysis20paper204.docx-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Policy20Analysis20paper204.docx-1.\"><\/object><a id=\"wp-block-file--media-1e752a1f-1ad7-4967-840d-fe75a57a0dd2\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Analysis20paper204.docx-1.pdf\">annotated-Policy20Analysis20paper204.docx-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Analysis20paper204.docx-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1e752a1f-1ad7-4967-840d-fe75a57a0dd2\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Ethical Implications of GDPR Paper:<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Analysis20paper203-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Policy20Analysis20paper203-1.\"><\/object><a id=\"wp-block-file--media-4437d781-876b-41ac-a035-b555305c0143\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Analysis20paper203-1.pdf\">annotated-Policy20Analysis20paper203-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Policy20Analysis20paper203-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4437d781-876b-41ac-a035-b555305c0143\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Mid-Term paper overview of (NCS): <\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Midterm20assigment20525-20Sahmer20Ismael.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Midterm20assigment20525-20Sahmer20Ismael.docx.\"><\/object><a id=\"wp-block-file--media-9cb3e08f-da6d-4d3f-9b27-7f512f8d584f\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Midterm20assigment20525-20Sahmer20Ismael.docx.pdf\">annotated-Midterm20assigment20525-20Sahmer20Ismael.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Midterm20assigment20525-20Sahmer20Ismael.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9cb3e08f-da6d-4d3f-9b27-7f512f8d584f\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Strategy and Policy This course introduces me to the importance that cybersecurity strategy and policy, possess within the digital realm. This includes how cybersecurity strategy and policy, are essential for protecting sensitive information from unauthorized access, and continuing business objectives. This course also explored the political implications, that arise from the strategy or policy &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/cyse-525\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 525<\/span><\/a><\/p>\n","protected":false},"author":26135,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/152"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/users\/26135"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/152\/revisions"}],"predecessor-version":[{"id":452,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/152\/revisions\/452"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/media?parent=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}