{"id":351,"date":"2025-11-30T18:08:59","date_gmt":"2025-11-30T18:08:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jacobthurman\/?page_id=351"},"modified":"2025-11-30T18:37:39","modified_gmt":"2025-11-30T18:37:39","slug":"projects","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jacobthurman\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"\n<p>This page showcases a collection of r<strong>esearch papers and academic projects<\/strong> I\u2019ve completed throughout my coursework. Each piece highlights the topics I\u2019ve explored, the methods I used, and the insights I gained through the research process.<\/p>\n\n\n\n<p><strong><em>Academic Projects:<\/em><\/strong><br>This first research paper is an in-depth investigation of one of the most notorious cyberattacks in the 2010s. A group of individuals hacked Microsoft, a leading cyber company, and accessed private credentials for users. <br>      Research Paper (CYSE300) &#8211; <em>The Xbox Underground | <a href=\"https:\/\/docs.google.com\/document\/d\/1ZoxDiy2hMoFIy1YtBSovR3iAUHIc5a_GdyraoXSz_HY\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1ZoxDiy2hMoFIy1YtBSovR3iAUHIc5a_GdyraoXSz_HY\/edit?usp=sharing\">View Paper Here<\/a><\/em><\/p>\n\n\n\n<p>This academic project relates towards the full understanding of the CIA triad, an important concept in any career relating to cybersecurity. It provides the full history, defines each aspect, and gives situational examples.<br>      Write-up Paper (CYSE200T) &#8211; <em>The CIA Triad | <a href=\"https:\/\/docs.google.com\/document\/d\/1fqwFoMQotiApFMEPHiZcoGWFzyGwzTEUfJANywuNC5k\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1fqwFoMQotiApFMEPHiZcoGWFzyGwzTEUfJANywuNC5k\/edit?usp=sharing\">View Paper Here<\/a><\/em><\/p>\n\n\n\n<p>This final write-up provides a management example of Chief Information Security Officer (CISO) and keeping information safe via the CIA triad. Examples of protocols, like providing various technologies and trainings, while also having a budget are illustrated.<br>      Write-up Paper (CYSE200T) &#8211; <em>The Human Factor | <a href=\"https:\/\/docs.google.com\/document\/d\/1oGItfFn5q0L4KaexLjMT_7Y36DKdiUkxPtrcVyUJlaU\/edit?tab=t.0\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1oGItfFn5q0L4KaexLjMT_7Y36DKdiUkxPtrcVyUJlaU\/edit?tab=t.0\">View Paper Here<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page showcases a collection of research papers and academic projects I\u2019ve completed throughout my coursework. Each piece highlights the topics I\u2019ve explored, the methods I used, and the insights I gained through the research process. Academic Projects:This first research paper is an in-depth investigation of one of the most notorious cyberattacks in the 2010s&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jacobthurman\/projects\/\">Read More<\/a><\/div>\n","protected":false},"author":31539,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jacobthurman\/wp-json\/wp\/v2\/pages\/351"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jacobthurman\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jacobthurman\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobthurman\/wp-json\/wp\/v2\/users\/31539"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobthurman\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jacobthurman\/wp-json\/wp\/v2\/pages\/351\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/sites.wp.odu.edu\/jacobthurman\/wp-json\/wp\/v2\/pages\/351\/revisions\/360"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jacobthurman\/wp-json\/wp\/v2\/media?parent=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}