{"id":239,"date":"2022-09-08T16:02:18","date_gmt":"2022-09-08T16:02:18","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=239"},"modified":"2024-11-25T07:50:21","modified_gmt":"2024-11-25T07:50:21","slug":"cyse-494","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/justingraham\/cyse-494\/","title":{"rendered":"CYSE 425"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-vivid-cyan-blue-background-color has-background\"><strong>Cybersecurity Policy and Strategy<\/strong><\/h1>\n\n\n\n<p>This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>This paper analyzes the National Cyber Security Strategy set forth by the United States Department of Defense<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-6692872a-3c97-42ca-9c1f-8bddb2a780ff\" href=\"https:\/\/sites.wp.odu.edu\/justingraham\/wp-content\/uploads\/sites\/30311\/2024\/10\/Midtern-Assignment_Justin-Graham.docx\">Analyzing Strategies_Justin-Graham<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justingraham\/wp-content\/uploads\/sites\/30311\/2024\/10\/Midtern-Assignment_Justin-Graham.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6692872a-3c97-42ca-9c1f-8bddb2a780ff\">Download<\/a><\/div>\n\n\n\n<p>This paper discusses the use of data privacy within the European Union&#8217;s GDPR. <\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-d804899c-a182-4f66-a46d-a72d4bb030c3\" href=\"https:\/\/sites.wp.odu.edu\/justingraham\/wp-content\/uploads\/sites\/30311\/2024\/10\/Policy-Analysis-1_Justin-Graham.docx\">Policy-Analysis-1_Justin-Graham<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justingraham\/wp-content\/uploads\/sites\/30311\/2024\/10\/Policy-Analysis-1_Justin-Graham.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d804899c-a182-4f66-a46d-a72d4bb030c3\">Download<\/a><\/div>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color has-large-font-size wp-elements-c7cc2a27c309fc30bf129cd80fd0b86d\">________________________________________________________<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Skill Development<\/strong><\/p>\n\n\n\n<ul>\n<li>Writing cybersecurity policies<\/li>\n\n\n\n<li>Analyzing cybersecurity policies<\/li>\n\n\n\n<li>Ethics<\/li>\n\n\n\n<li>Adaptability<\/li>\n\n\n\n<li>Practicality<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Policy and Strategy This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/justingraham\/cyse-494\/\">Read More<\/a><\/div>\n","protected":false},"author":24768,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/pages\/239"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/users\/24768"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/pages\/239\/revisions"}],"predecessor-version":[{"id":553,"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/pages\/239\/revisions\/553"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justingraham\/wp-json\/wp\/v2\/media?parent=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}