{"id":133,"date":"2023-09-23T14:33:50","date_gmt":"2023-09-23T14:33:50","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-09-08T23:43:15","modified_gmt":"2024-09-08T23:43:15","slug":"it-cyse-200t","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<p>Below are some of my completed work from this class.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-eportfolio wp-block-embed-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"TKDCvCoF53\"><a href=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/balancing-cybersecurity-and-technology\/\">BALANCING CYBERSECURITY AND TECHNOLOGY<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;BALANCING CYBERSECURITY AND TECHNOLOGY&#8221; &#8212; ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/balancing-cybersecurity-and-technology\/embed\/#?secret=P7Zlaf2LYu#?secret=TKDCvCoF53\" data-secret=\"TKDCvCoF53\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-eportfolio wp-block-embed-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"rW9j8VKoqc\"><a href=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/addressing-scada-vulnerabilities\/\">ADDRESSING SCADA VULNERABILITIES<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;ADDRESSING SCADA VULNERABILITIES&#8221; &#8212; ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/addressing-scada-vulnerabilities\/embed\/#?secret=5lefESerVA#?secret=rW9j8VKoqc\" data-secret=\"rW9j8VKoqc\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-eportfolio wp-block-embed-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"nCBZkKiXGs\"><a href=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/workplace-deviance\/\">WORKPLACE DEVIANCE<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;WORKPLACE DEVIANCE&#8221; &#8212; ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/workplace-deviance\/embed\/#?secret=vEp4LNAjKx#?secret=nCBZkKiXGs\" data-secret=\"nCBZkKiXGs\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-eportfolio wp-block-embed-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"zros1Kk3EI\"><a href=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/protecting-availability\/\">PROTECTING AVAILABILITY<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;PROTECTING AVAILABILITY&#8221; &#8212; ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/protecting-availability\/embed\/#?secret=Hpe9GykmMs#?secret=zros1Kk3EI\" data-secret=\"zros1Kk3EI\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-eportfolio wp-block-embed-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"aOr4KoF2M4\"><a href=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/meeting-the-challenges-of-the-networked-world\/\">MEETING THE CHALLENGES OF THE NETWORKED WORLD<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;MEETING THE CHALLENGES OF THE NETWORKED WORLD&#8221; &#8212; ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/israellim1\/tech-and-society\/it-cyse-200t\/meeting-the-challenges-of-the-networked-world\/embed\/#?secret=KZOpiLVbyd#?secret=aOr4KoF2M4\" data-secret=\"aOr4KoF2M4\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Below are some of my completed work from this class.<\/p>\n","protected":false},"author":27590,"featured_media":0,"parent":91,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"hide_page_title":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/users\/27590"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":418,"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/pages\/133\/revisions\/418"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/pages\/91"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/israellim1\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}