{"id":303,"date":"2025-12-08T23:31:02","date_gmt":"2025-12-08T23:31:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/natemcmillan\/?page_id=303"},"modified":"2025-12-08T23:35:06","modified_gmt":"2025-12-08T23:35:06","slug":"cybersecurity-technology-and-society","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/natemcmillan\/academics\/cybersecurity-technology-and-society\/","title":{"rendered":"Cybersecurity, Technology, and Society"},"content":{"rendered":"\n<p>The CIA Triad:<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-34b9d486-944d-40a1-9475-20a721ccb412\" href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2025\/12\/CIA-TRIAD.docx\">CIA-TRIAD<\/a><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2025\/12\/CIA-TRIAD.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-34b9d486-944d-40a1-9475-20a721ccb412\">Download<\/a><\/div>\n\n\n\n<p>Hacking Humans:<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-7a2b74db-ed8d-42be-b443-c7c55874a6ca\" href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2025\/12\/Hacking-Humans.docx\">Hacking-Humans<\/a><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2025\/12\/Hacking-Humans.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7a2b74db-ed8d-42be-b443-c7c55874a6ca\">Download<\/a><\/div>\n\n\n\n<p>SCADA Systems:<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-d1b80e62-a627-4f75-a4bc-40065603a789\" href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2025\/12\/SCADA-Writeup.docx\">SCADA Systems<\/a><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2025\/12\/SCADA-Writeup.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d1b80e62-a627-4f75-a4bc-40065603a789\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad: Hacking Humans: SCADA Systems:<\/p>\n","protected":false},"author":29191,"featured_media":0,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/303"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/users\/29191"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/303\/revisions"}],"predecessor-version":[{"id":311,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/303\/revisions\/311"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/33"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/media?parent=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}