{"id":296,"date":"2026-04-19T15:28:58","date_gmt":"2026-04-19T15:28:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/?p=296"},"modified":"2026-04-19T16:07:23","modified_gmt":"2026-04-19T16:07:23","slug":"sfhlksdajlfjlasdjfl","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/2026\/04\/19\/sfhlksdajlfjlasdjfl\/","title":{"rendered":"Blogs\/Write-Ups\/Discussions"},"content":{"rendered":"\n<p><span style=\"text-decoration: underline\"><strong>The NIST Cyber Security Framework<\/strong><\/span><strong><span style=\"text-decoration: underline\"> (Discussion):<\/span><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"669\" height=\"77\" src=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Screenshot-2026-04-19-113430.png\" alt=\"\" class=\"wp-image-300\" srcset=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Screenshot-2026-04-19-113430.png 669w, https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Screenshot-2026-04-19-113430-300x35.png 300w, https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Screenshot-2026-04-19-113430-600x69.png 600w\" sizes=\"(max-width: 669px) 100vw, 669px\" \/><\/figure>\n\n\n\n<p>I feel that &#8220;Understand and Assess&#8221; is such an integral part of the cyber security world as it relates to organizational security. I would absolutely implement this framework in my own organization as quarterly or monthly meetings with the departments revolving around cyber security could allow for valuable inputs and positive adjustments to our security posture.<\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline\">Criminal Justice &amp; Cyber Security<\/span><\/strong><span style=\"text-decoration: underline\"><strong> (Discussion):<\/strong><\/span> <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"703\" height=\"109\" src=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Screenshot-2026-04-19-113220-1.png\" alt=\"\" class=\"wp-image-301\" srcset=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Screenshot-2026-04-19-113220-1.png 703w, https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Screenshot-2026-04-19-113220-1-300x47.png 300w, https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Screenshot-2026-04-19-113220-1-600x93.png 600w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/figure>\n\n\n\n<p>This does seem to be a &#8220;Catch 22&#8221; if you will. The more technology evolves the more threats increase against Information systems which in turn increases the level of Criminal Justice reform\/safeguards. It must be a very difficult job to safeguard individual privacy while also prosecuting malicious actors. The line between both is very thin, requiring advanced knowledge about cyberlaws\/individual liberties to properly advance safeguards. <\/p>\n\n\n\n<p><span style=\"text-decoration: underline\"><strong>Chai Article (Write-Up):<\/strong><\/span> <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Chai-Article.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Chai-Article.\"><\/object><a id=\"wp-block-file--media-bf313d2a-c936-4cad-84b2-d4d87a971b40\" href=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Chai-Article.pdf\">Chai-Article<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/Chai-Article.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bf313d2a-c936-4cad-84b2-d4d87a971b40\">Download<\/a><\/div>\n\n\n\n<p><span style=\"text-decoration: underline\"><strong>SCADA Systems (Write-Up):<\/strong><\/span><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/SCADA-SYSTEMS.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SCADA-SYSTEMS.\"><\/object><a id=\"wp-block-file--media-5674e29c-0fc1-4afd-84ad-6955ec8de34c\" href=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/SCADA-SYSTEMS.pdf\">SCADA-SYSTEMS<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-content\/uploads\/sites\/40811\/2026\/04\/SCADA-SYSTEMS.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5674e29c-0fc1-4afd-84ad-6955ec8de34c\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The NIST Cyber Security Framework (Discussion): I feel that &#8220;Understand and Assess&#8221; is such an integral part of the cyber security world as it relates to organizational security. I would absolutely implement this framework in my own organization as quarterly or monthly meetings with the departments revolving around cyber security could allow for valuable inputs&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/2026\/04\/19\/sfhlksdajlfjlasdjfl\/\">Read More<\/a><\/div>\n","protected":false},"author":32153,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/users\/32153"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/posts\/296\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nathaniel-lyon\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}