{"id":233,"date":"2022-09-08T16:02:18","date_gmt":"2022-09-08T16:02:18","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=233"},"modified":"2024-11-25T07:39:54","modified_gmt":"2024-11-25T07:39:54","slug":"ece-419","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/justingraham\/ece-419\/","title":{"rendered":"CYSE 495"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-vivid-cyan-blue-background-color has-background\">Cybersecurity Risk Management<\/h1>\n\n\n\n<p>This course was devoted to understanding the role of cybersecurity systems and their importance in developing robust cybersecurity strategies and ensuring compliance with regulatory standards throughout the comprehensive discussion and analysis of the NIST Cyber Security Framework (CSF) and ease the effective implementation of such standards in various organizational scales through the proposing real-world case studies<\/p>\n\n\n\n<p>Parallel to this, this course also explored the Cybersecurity Maturity Model Certification (CMMC) in greater detail, including all its essential elements, such as domains, levels, and capabilities. The course will guide the CMMC assessment stage as it integrates with NIST policies and eases the effective implementation of these standards in organizations.<\/p>\n\n\n\n<p class=\"has-text-align-left\">This lab explores the key terms of risk management along with strategies for conducting risk assessments.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-00fc2de5-7868-4939-8f0e-13affd10920f\" href=\"https:\/\/sites.wp.odu.edu\/justingraham\/wp-content\/uploads\/sites\/30311\/2024\/10\/Lab01_Justin-Graham.docx\">Risk Managment_Justin-Graham<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justingraham\/wp-content\/uploads\/sites\/30311\/2024\/10\/Lab01_Justin-Graham.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-00fc2de5-7868-4939-8f0e-13affd10920f\">Download<\/a><\/div>\n\n\n\n<p>This lab answers questions regarding encryption including symmetric, asymmetric, digital signatures, and hashing. <\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e4ec720d-c2dd-44e6-b101-47bd37e24eda\" href=\"https:\/\/sites.wp.odu.edu\/justingraham\/wp-content\/uploads\/sites\/30311\/2024\/10\/Lab04_Justin-Graham.docx\">Encryption_Justin-Graham<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justingraham\/wp-content\/uploads\/sites\/30311\/2024\/10\/Lab04_Justin-Graham.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e4ec720d-c2dd-44e6-b101-47bd37e24eda\">Download<\/a><\/div>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color has-large-font-size wp-elements-c7cc2a27c309fc30bf129cd80fd0b86d\">________________________________________________________<\/p>\n\n\n\n<p>Skills Developed:<\/p>\n\n\n\n<ul>\n<li>Encrpytion methods<\/li>\n\n\n\n<li>Hashing<\/li>\n\n\n\n<li>Risk assessments<\/li>\n\n\n\n<li>Motivations for attacks<\/li>\n\n\n\n<li>Policy design principles<\/li>\n\n\n\n<li>Vulnerabilities<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Risk Management This course was devoted to understanding the role of cybersecurity systems and their importance in developing robust cybersecurity strategies and ensuring compliance with regulatory standards throughout the comprehensive discussion and analysis of the NIST Cyber Security Framework (CSF) and ease the effective implementation of such standards in various organizational scales through the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/justingraham\/ece-419\/\">Read More<\/a><\/div>\n","protected":false},"author":24768,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/pages\/233"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/users\/24768"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/pages\/233\/revisions"}],"predecessor-version":[{"id":549,"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/pages\/233\/revisions\/549"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/media?parent=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}