{"id":350,"date":"2026-05-01T02:28:20","date_gmt":"2026-05-01T02:28:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nross008\/?page_id=350"},"modified":"2026-05-01T02:53:32","modified_gmt":"2026-05-01T02:53:32","slug":"free-writes","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nross008\/free-writes\/","title":{"rendered":"Free Writes"},"content":{"rendered":"\n<p>This page contains links to free writes and journals I completed within the class of CYSE 200T.<\/p>\n\n\n\n<p>CIA Triad &#8211; This writeup explains the CIA triad and goes over differences between Authorization and Authentication. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/The-CIA-Triad-Write-Up.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-CIA-Triad-Write-Up.\"><\/object><a id=\"wp-block-file--media-f31673a5-1d93-4e8f-8098-2a1a6aa25885\" href=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/The-CIA-Triad-Write-Up.pdf\">The-CIA-Triad-Write-Up<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/The-CIA-Triad-Write-Up.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f31673a5-1d93-4e8f-8098-2a1a6aa25885\">Download<\/a><\/div>\n\n\n\n<p>SCADA Systems &#8211; This write up is about vulnerabilities within critical infrastructure related to cybersecurity and how SCADA applications can help mitigate the risks.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/SCADA-WriteUp.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SCADA-WriteUp.\"><\/object><a id=\"wp-block-file--media-671578c9-c95e-467b-9b21-39d67b2041c8\" href=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/SCADA-WriteUp.pdf\">SCADA-WriteUp<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/SCADA-WriteUp.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-671578c9-c95e-467b-9b21-39d67b2041c8\">Download<\/a><\/div>\n\n\n\n<p>Analytical Reflection Paper &#8211; This paper covers topics covered throughout the semester in CYSE200T.  Primarily common threats, cybercrime, and critical infrastructures and how cyber policies and regulations struggle to keep up with rapid changes in technology.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/Nicholas-Rossler-CYSE200-Analytical-Reflection-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Nicholas-Rossler-CYSE200-Analytical-Reflection-Paper.\"><\/object><a id=\"wp-block-file--media-b92de6d9-a720-4ba5-8b43-022dadc64b40\" href=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/Nicholas-Rossler-CYSE200-Analytical-Reflection-Paper.pdf\">Nicholas-Rossler-CYSE200-Analytical-Reflection-Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nross008\/wp-content\/uploads\/sites\/39729\/2026\/05\/Nicholas-Rossler-CYSE200-Analytical-Reflection-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b92de6d9-a720-4ba5-8b43-022dadc64b40\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This page contains links to free writes and journals I completed within the class of CYSE 200T. CIA Triad &#8211; This writeup explains the CIA triad and goes over differences between Authorization and Authentication. SCADA Systems &#8211; This write up is about vulnerabilities within critical infrastructure related to cybersecurity and how SCADA applications can help&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nross008\/free-writes\/\">Read More<\/a><\/div>\n","protected":false},"author":31330,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/pages\/350"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/users\/31330"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/pages\/350\/revisions"}],"predecessor-version":[{"id":359,"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/pages\/350\/revisions\/359"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nross008\/wp-json\/wp\/v2\/media?parent=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}