{"id":383,"date":"2023-11-06T01:01:15","date_gmt":"2023-11-06T01:01:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?page_id=383"},"modified":"2025-05-05T18:01:38","modified_gmt":"2025-05-05T22:01:38","slug":"cyse-300-research-papers","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-300-research-papers\/","title":{"rendered":"Cybersecurity Risk &amp; Policy Papers"},"content":{"rendered":"\n<p>This page features a collection of research papers completed for <strong>CYSE 300: Introduction to Cybersecurity<\/strong>. Each paper explores different cybersecurity topics, including major security breaches, organizational policy design, and personal privacy protection. Together, these papers demonstrate my ability to research cybersecurity issues, critically analyze risks, and apply professional writing skills to real-world cybersecurity challenges.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Edward Snowden\u2019s Cybersecurity Breach<\/h3>\n\n\n\n<p>This paper examines a significant cybersecurity breach involving Edward Snowden\u2019s disclosure of classified information. It discusses the vulnerabilities that were exploited, the threats that took advantage of those weaknesses, the repercussions of the breach, and cybersecurity measures that could have mitigated or prevented the incident.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2023\/11\/CYSE-300-Research-Paper-1_Jasmyn-Wilhelm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-300-Research-Paper-1_Jasmyn-Wilhelm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Information Security Policies<\/h3>\n\n\n\n<p>This paper focuses on designing a security policy for a corporate information system with sensitive on-premises databases. It discusses five critical issues that should be addressed in the policy to protect web, application, and database servers from cybersecurity threats.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2023\/11\/CYSE-300-Research-Paper-2_Jasmyn-Wilhelm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-300-Research-Paper-2_Jasmyn-Wilhelm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Privacy on the Web<\/h3>\n\n\n\n<p>As an extra credit opportunity, this paper explores the challenges of maintaining personal privacy online. It analyzes key cybersecurity risks associated with web privacy and discusses strategies individuals and organizations can use to better protect sensitive information in a digital environment.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2023\/12\/CYSE-300-Research-Paper-Wilhelm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-300-Research-Paper-Wilhelm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page features a collection of research papers completed for CYSE 300: Introduction to Cybersecurity. Each paper explores different cybersecurity topics, including major security breaches, organizational policy design, and personal privacy protection. Together, these papers demonstrate my ability to research&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-300-research-papers\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/383"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=383"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/383\/revisions"}],"predecessor-version":[{"id":1310,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/383\/revisions\/1310"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}