{"id":120,"date":"2025-09-22T16:17:19","date_gmt":"2025-09-22T16:17:19","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2026-02-24T04:20:00","modified_gmt":"2026-02-24T04:20:00","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nashl005\/","title":{"rendered":"Home"},"content":{"rendered":"<h1 data-start=\"182\" data-end=\"224\"><strong data-start=\"184\" data-end=\"224\">Cybersecurity E-Portfolio \u2014 Homepage<\/strong><\/h1>\n<h2 data-start=\"226\" data-end=\"240\"><strong data-start=\"229\" data-end=\"240\">Welcome<\/strong><\/h2>\n<p data-start=\"241\" data-end=\"643\">Hello, and welcome to my cybersecurity e-portfolio. My name is <b>Nassarrio Ashley<\/b>, and I am a cybersecurity student focused on protecting digital systems, understanding cyber threats, and helping organizations manage risk in an increasingly connected world. This portfolio highlights my academic work, technical skills, projects, and professional goals as I continue developing my career in cybersecurity.<\/p>\n<p data-start=\"645\" data-end=\"941\">Cybersecurity is more than just technology \u2014 it is about critical thinking, ethics, problem-solving, and protecting people and information. Through my studies, I have gained experience with core security concepts such as risk management, network defense, digital privacy, and security frameworks.<\/p>\n<hr data-start=\"943\" data-end=\"946\" \/>\n<h2 data-start=\"948\" data-end=\"963\"><strong data-start=\"951\" data-end=\"963\">About Me<\/strong><\/h2>\n<p data-start=\"964\" data-end=\"1314\">I am currently studying cybersecurity with an interest in areas such as governance, risk, and compliance (GRC), cyber law, and security operations. My academic journey has allowed me to explore both the technical and legal sides of cybersecurity, helping me understand how policies, regulations, and technology work together to protect organizations.<\/p>\n<p data-start=\"1316\" data-end=\"1345\">Some of my strengths include:<\/p>\n<ul data-start=\"1347\" data-end=\"1529\">\n<li data-start=\"1347\" data-end=\"1390\">\n<p data-start=\"1349\" data-end=\"1390\">Analytical thinking and problem solving<\/p>\n<\/li>\n<li data-start=\"1391\" data-end=\"1452\">\n<p data-start=\"1393\" data-end=\"1452\">Understanding cybersecurity frameworks and best practices<\/p>\n<\/li>\n<li data-start=\"1453\" data-end=\"1487\">\n<p data-start=\"1455\" data-end=\"1487\">Research and technical writing<\/p>\n<\/li>\n<li data-start=\"1488\" data-end=\"1529\">\n<p data-start=\"1490\" data-end=\"1529\">Ethical decision-making in technology<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1531\" data-end=\"1534\" \/>\n<h2 data-start=\"1536\" data-end=\"1577\"><strong data-start=\"1539\" data-end=\"1577\">What You\u2019ll Find in This Portfolio<\/strong><\/h2>\n<p data-start=\"1578\" data-end=\"1706\">This e-portfolio showcases my growth as a cybersecurity student and highlights the skills I am building throughout my education.<\/p>\n<p data-start=\"1708\" data-end=\"1882\"><strong data-start=\"1708\" data-end=\"1733\">Projects &amp; Coursework<\/strong><br data-start=\"1733\" data-end=\"1736\" \/>Examples of assignments, research papers, and cybersecurity analyses that demonstrate my understanding of current threats and security strategies.<\/p>\n<p data-start=\"1884\" data-end=\"2028\"><strong data-start=\"1884\" data-end=\"1902\">Skills &amp; Tools<\/strong><br data-start=\"1902\" data-end=\"1905\" \/>Technical and professional skills I am developing, including cybersecurity concepts, risk analysis, and security awareness.<\/p>\n<p data-start=\"2030\" data-end=\"2218\"><strong data-start=\"2030\" data-end=\"2046\">Career Goals<\/strong><br data-start=\"2046\" data-end=\"2049\" \/>My long-term goal is to work in a cybersecurity role that combines technology, law, and policy \u2014 helping organizations stay secure while navigating evolving regulations.<\/p>\n<p data-start=\"2220\" data-end=\"2342\"><strong data-start=\"2220\" data-end=\"2249\">Certifications &amp; Learning<\/strong><br data-start=\"2249\" data-end=\"2252\" \/>Ongoing training, certifications, and coursework that support my professional development.<\/p>\n<hr data-start=\"2344\" data-end=\"2347\" \/>\n<h2 data-start=\"2349\" data-end=\"2366\"><strong data-start=\"2352\" data-end=\"2366\">My Mission<\/strong><\/h2>\n<p data-start=\"2367\" data-end=\"2655\">My mission is to contribute to a safer digital environment by combining cybersecurity knowledge with ethical responsibility. As technology continues to evolve, I aim to stay adaptable, continuously learn, and apply cybersecurity principles that protect both individuals and organizations.<\/p>\n<p data-start=\"2367\" data-end=\"2655\">\u00a0<\/p>\n<p data-start=\"2367\" data-end=\"2655\">\u00a0<\/p>\n<h1 data-start=\"2367\" data-end=\"2655\"><strong>Business Writing project\u00a0<\/strong><\/h1>\n<p data-start=\"2367\" data-end=\"2655\"><\/p>\n<p><strong>The CIA Triad and Authentication vs. Authorization<\/strong><br \/>\u00a0Nassarrio Ashley<br \/>\u00a0Old Dominion University<br \/>\u00a0Cyse 200T<br \/>\u00a0February 17, 2026<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Introduction<\/strong><\/h2>\n<p>The CIA Triad is a foundational cybersecurity model used to guide information security policies within organizations. According to Chai (2022), the three core principles are confidentiality, integrity, and availability. Together, these concepts help organizations protect data, maintain trust, and ensure systems remain operational. Understanding the CIA Triad is essential for cybersecurity professionals because it provides a framework for evaluating risk and designing secure system whitin the law and regulation we have in the United States. It is used as a frame work to response to cyber threats like most thing in cyber \u00a0security things are handed through frame works to work within compliance.<\/p>\n<h2><strong>Confidentiality<\/strong><\/h2>\n<p>Confidentiality refers to protecting information from unauthorized access. Organizations implement confidentiality through encryption, strong passwords, multi factor authentication, and access controls. The goal is to make sure only approved users can view sensitive data. For example, when a student logs into a university portal using secure credentials, confidentiality prevents outsiders from accessing grades or personal information. Sensitivity data falls into many category such as medical military and financial recorders confidentiality is one of the most important parts of cyber security because cyber criminals \u00a0are going after private information to sell or use for Ransome.<\/p>\n<h2><strong>Integrity<\/strong><\/h2>\n<p>Integrity ensures that data remains accurate, consistent, and trustworthy throughout its lifecycle. This means information cannot be altered without authorization. Techniques such as checksums, version control, logging, and backups help preserve integrity. For instance, in online banking, transaction records must remain unchanged so users and institutions can trust financial data. Integrity also intel&#8217;s when information is leaked and the users need to know. Many company&#8217;s do not do this<\/p>\n<h2><strong>Availability<\/strong><\/h2>\n<p>Availability guarantees that authorized users can access information and systems when needed. Maintaining hardware, updating software, monitoring networks, and using backups or redundancy all support availability. A good example is a cloud service that stays online during heavy traffic due to failover systems and disaster recovery planning.<\/p>\n<h2><strong>Authentication vs. Authorization<\/strong><\/h2>\n<p>Authentication and authorization are closely related but serve different purposes in cybersecurity. Authentication is the process of verifying a user\u2019s identity, while authorization determines what that verified user is allowed to do. Authentication answers the question \u201cWho are you?\u201d whereas authorization answers \u201cWhat can you access?\u201d<\/p>\n<p><strong>Example:<\/strong><br \/>\u00a0When a student logs into a college learning platform, entering a username and password or completing multi factor authentication proves their identity, which is authentication. After logging in, the system decides whether the student can view assignments, submit work, or access administrative tools. Those permissions represent authorization. Even if two users successfully authenticate, they may have different authorization levels depending on their role.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>The CIA Triad remains a core model for cybersecurity because it emphasizes protecting privacy, maintaining trustworthy data, and ensuring consistent system access. Authentication and authorization work alongside these principles by confirming user identity and controlling access rights. Together, these concepts form the backbone of modern information security practices.<\/p>\n<h2><strong>References<\/strong><\/h2>\n<p>Chai, W. (2022, June 28). <em>What is the CIA triad? Definition, explanation, examples<\/em>. TechTarget.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>The CIA Triad and Authentication vs. Authorization<\/strong><br \/>\u00a0Nassarrio Ashley<br \/>\u00a0Old Dominion University<br \/>\u00a0Cyse 200T<br \/>\u00a0February 17, 2026<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Introduction<\/strong><\/h2>\n<p>The CIA Triad is a foundational cybersecurity model used to guide information security policies within organizations. According to Chai (2022), the three core principles are confidentiality, integrity, and availability. Together, these concepts help organizations protect data, maintain trust, and ensure systems remain operational. Understanding the CIA Triad is essential for cybersecurity professionals because it provides a framework for evaluating risk and designing secure system whitin the law and regulation we have in the United States. It is used as a frame work to response to cyber threats like most thing in cyber \u00a0security things are handed through frame works to work within compliance.<\/p>\n<h2><strong>Confidentiality<\/strong><\/h2>\n<p>Confidentiality refers to protecting information from unauthorized access. Organizations implement confidentiality through encryption, strong passwords, multi factor authentication, and access controls. The goal is to make sure only approved users can view sensitive data. For example, when a student logs into a university portal using secure credentials, confidentiality prevents outsiders from accessing grades or personal information. Sensitivity data falls into many category such as medical military and financial recorders confidentiality is one of the most important parts of cyber security because cyber criminals \u00a0are going after private information to sell or use for Ransome.<\/p>\n<h2><strong>Integrity<\/strong><\/h2>\n<p>Integrity ensures that data remains accurate, consistent, and trustworthy throughout its lifecycle. This means information cannot be altered without authorization. Techniques such as checksums, version control, logging, and backups help preserve integrity. For instance, in online banking, transaction records must remain unchanged so users and institutions can trust financial<\/p>\n<p data-start=\"2367\" data-end=\"2655\">\n\n<\/p>\n<p class=\"has-small-font-size\">\u00a0<\/p>\n<p data-start=\"2367\" data-end=\"2655\">\n\n<\/p>\n<p class=\"has-small-font-size\">\u00a0<\/p>\n<p data-start=\"2367\" data-end=\"2655\"><\/p>\n<p data-start=\"2367\" data-end=\"2655\">\u00a0<\/p>\n\n\n<p class=\"has-small-font-size\"><\/p>\n\n\n\n<p class=\"has-medium-font-size\"> <\/p>\n\n\n\n<p> <\/p>\n\n\n\n<p class=\"has-medium-font-size\"> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity E-Portfolio \u2014 Homepage Welcome Hello, and welcome to my cybersecurity e-portfolio. My name is Nassarrio Ashley, and I am a cybersecurity student focused on protecting digital systems, understanding cyber threats, and helping organizations manage risk in an increasingly connected world. This portfolio highlights my academic work, technical skills, projects, and professional goals as I&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nashl005\/\">Read More<\/a><\/div>\n","protected":false},"author":31517,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nashl005\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nashl005\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nashl005\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nashl005\/wp-json\/wp\/v2\/users\/31517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nashl005\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/nashl005\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/nashl005\/wp-json\/wp\/v2\/pages\/120\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nashl005\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}