{"id":133,"date":"2023-09-25T16:35:56","date_gmt":"2023-09-25T16:35:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2023-12-15T18:53:14","modified_gmt":"2023-12-15T18:53:14","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jscyber\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li><span style=\"font-size: revert\">The evolution of cyber technology has undeniably opened avenues for criminal behavior, providing both sophisticated tools and opportunities for malicious actors. The interconnected nature of the digital world enables activities such as hacking, identity theft, and cyber espionage. The anonymity afforded by the internet facilitates the creation of underground markets for stolen data and cybercrime-as-a-service, allowing individuals with minimal technical expertise to engage in criminal activities. The rapid pace of technological advancement often outpaces legal and regulatory frameworks, creating a dynamic environment where cybercriminals can exploit vulnerabilities before they are adequately addressed.<\/span><\/li>\n<li><span style=\"font-size: revert\">Course Material<\/span><\/li>\n<\/ol>\n<p>Here are some of my assignments I have done throughout my course in CYSE 201 I will label so I can be sure you know what you are looking for.\u00a0<\/p>\n<p>Here is my career paper\u00a0<\/p>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jscyber\/wp-content\/uploads\/sites\/34376\/2023\/12\/Career-paper-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Career-paper-2.\"><\/object><a id=\"wp-block-file--media-9263e5fc-7b94-4366-95f7-d5548323185a\" href=\"https:\/\/sites.wp.odu.edu\/jscyber\/wp-content\/uploads\/sites\/34376\/2023\/12\/Career-paper-2.pdf\">Career-paper-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jscyber\/wp-content\/uploads\/sites\/34376\/2023\/12\/Career-paper-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9263e5fc-7b94-4366-95f7-d5548323185a\">Download<\/a><\/div>\n\n\n\n<p>Here is my Article review <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jscyber\/wp-content\/uploads\/sites\/34376\/2023\/12\/Article-1-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-1-.\"><\/object><a id=\"wp-block-file--media-eb8fc9d4-47d5-4bee-8db8-c56aedf27cb4\" href=\"https:\/\/sites.wp.odu.edu\/jscyber\/wp-content\/uploads\/sites\/34376\/2023\/12\/Article-1-.pdf\">Article-1-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jscyber\/wp-content\/uploads\/sites\/34376\/2023\/12\/Article-1-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-eb8fc9d4-47d5-4bee-8db8-c56aedf27cb4\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: The evolution of cyber technology has undeniably opened&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jscyber\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27627,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jscyber\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jscyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jscyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jscyber\/wp-json\/wp\/v2\/users\/27627"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jscyber\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jscyber\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/jscyber\/wp-json\/wp\/v2\/pages\/133\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jscyber\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}