{"id":411,"date":"2025-12-08T02:58:14","date_gmt":"2025-12-08T02:58:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/?page_id=411"},"modified":"2025-12-08T02:58:14","modified_gmt":"2025-12-08T02:58:14","slug":"skills-artifacts3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/skills-artifacts3\/","title":{"rendered":"Skills\/Artifacts3"},"content":{"rendered":"\n<p>Skill: Cybersecurity Policy &amp; Governance<\/p>\n\n\n\n<p>Artifact 1: National vs. Private Sector Responsibilities in Cyberspace \u2013 CYSE 425W Discussion<\/p>\n\n\n\n<p>This artifact comes from my CYSE 425W Cybersecurity Strategy and Policy class. The assignment asked us to examine where national governments should begin and end their authority in cyberspace, and where private companies\u2019 responsibilities start and stop. This required analyzing policy boundaries, national security concerns, the role of private industry and how both sectors share responsibility for protecting digital infrastructure. This discussion shows my ability to think about cybersecurity from a policy and strategic perspective not just a technical one.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Full Text of Artifact<\/p>\n\n\n\n<p>CYSE 425W \u2013 Discussion Topic 2<\/p>\n\n\n\n<p>Where should the power and responsibility of national governments begin and end in cyberspace? Where does the responsibility of private firms begin and end in cybersecurity? The power and responsibility of national governments in cyberspace should begin with protecting critical infrastructure and enforcing cybersecurity laws. Governments are responsible for defending against major threats like nation-state cyberattacks and cyberterrorism\u2014incidents that go beyond what a single company can handle. I think the government\u2019s role should end where it risks threatening individual privacy or interfering in areas that are best handled by the private sector such as everyday network operations and security innovation. Private companies should be accountable for protecting their own systems, securing customer information, and reporting incidents when they happen. Their responsibility should end when the threat becomes too large or sophisticated for them to manage alone\u2014like state-sponsored cyberattacks which I see as a matter of national defense. The balance lies in collaboration. Governments and private companies should share information and resources to strengthen cybersecurity without expecting either side to carry the full weight by themselves. Neither sector can defend cyberspace alone but together they can build a stronger and more resilient cybersecurity foundation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Interdisciplinary Significance<\/p>\n\n\n\n<p>This artifact shows how cybersecurity strategy connects to public policy, national security, business leadership and ethics. Understanding the limits of government authority requires knowledge of constitutional rights and privacy law while defining the responsibilities of private companies involves business risk, economics and operational security. This assignment helped me think about cybersecurity as a shared responsibility influenced by political science, law, technology and organizational behavior. It strengthened my ability to evaluate policy questions from multiple angles and understand why strong collaboration between government and industry is essential for national cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Skill: Cybersecurity Policy &amp; Governance Artifact 1: National vs. Private Sector Responsibilities in Cyberspace \u2013 CYSE 425W Discussion This artifact comes from my CYSE 425W Cybersecurity Strategy and Policy class. The assignment asked us to examine where national governments should begin and end their authority in cyberspace, and where private companies\u2019 responsibilities start and stop&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/skills-artifacts3\/\">Read More<\/a><\/div>\n","protected":false},"author":29731,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/411"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/users\/29731"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/comments?post=411"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/411\/revisions"}],"predecessor-version":[{"id":412,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/411\/revisions\/412"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/media?parent=411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}