{"id":298,"date":"2023-02-03T18:29:17","date_gmt":"2023-02-03T18:29:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/?page_id=298"},"modified":"2023-04-15T17:08:48","modified_gmt":"2023-04-15T17:08:48","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/it-cyse-200t\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color\">This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Students are introduced to a human-factors approach to understanding cybersecurity threats. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks and cybersecurity incidents. The class also explores how cybersecurity is studied by social scientists in various social science disciplines.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 is-style-fill\"><a class=\"wp-block-button__link has-black-color has-cyan-bluish-gray-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/blog\/\">Click here to see my latest blogs!<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>SOME<\/strong> <strong>JOURNAL ENTRIES:<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-small-font-size\"><strong>Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.<\/strong> <mark class=\"has-inline-color has-vivid-red-color\">After reviewing the NICE Workforce Framework the most appealing area to me that I would like to focus my career on would be Securely Provision, Protect and Defend, and lastly this area would be something I would like later down the line in my career and that is Oversee and Govern. The other areas really have no interest in me but if there were offering me that position and nothing else I liked was available I will take it. <\/mark><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-small-font-size\"><strong>Explain how the principles of science relate to cybersecurity.<\/strong> <mark class=\"has-inline-color has-vivid-red-color\">The principles of science relate to cybersecurity by<\/mark> <mark class=\"has-inline-color has-vivid-red-color\">testing and experimentation because science involves testing hypotheses through experiments and simulations. In cybersecurity, this means testing security systems and protocols to identify weaknesses and vulnerabilities that could be exploited by attackers. Another one would be data analysis because science involves analyzing data to identify patterns and trends. In cybersecurity, this means analyzing network traffic, logs, and other data to identify signs of suspicious activity or potential attacks.<\/mark><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-small-font-size\"><strong>Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? <\/strong><mark class=\"has-inline-color has-vivid-red-color\">Researches can use this information to help them find what the cause could be with the data breaches. If there is a trend they find then it could help them figure out what could be the leading cause of the problem. It also helps out by knowing what the attackers are targeting and that could benefit other companies by putting stronger defenses on that type of data these attackers are targeting. <\/mark><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Students are introduced to a human-factors approach to understanding cybersecurity threats. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/it-cyse-200t\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":25798,"featured_media":0,"parent":91,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/users\/25798"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/298\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/298\/revisions\/360"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/91"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/media?parent=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}