{"id":133,"date":"2024-02-03T17:45:39","date_gmt":"2024-02-03T17:45:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-04-18T17:06:17","modified_gmt":"2024-04-18T17:06:17","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/owinifill\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Reflecting on what I&#8217;ve learned in this cyber security class has been eye-opening. I never realized how many different areas intersect with cyber security\u2014like business, engineering, law, and even philosophy. In today&#8217;s increasingly digital world, where technology plays a central role in everything we do, it&#8217;s crucial for companies across all industries to protect themselves from cybercrimes. As we move forward, businesses big and small will rely more heavily on cyber security measures to defend against threats. Cyber security isn&#8217;t just about technology\u2014it&#8217;s a complex challenge that requires expertise from various fields. To tackle this challenge effectively, we need to blend technical skills with strategic thinking, legal knowledge, and ethical considerations.<\/p>\n<h1>Course Material<\/h1>\n<p class=\"p1\">\u00a0<\/p>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/Write-Up-The-CIA-Triad.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-Up-The-CIA-Triad.\"><\/object><a id=\"wp-block-file--media-d43258a0-336b-4b2c-9483-73d47a31448d\" href=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/Write-Up-The-CIA-Triad.pdf\">Write-Up-The-CIA-Triad<\/a><a href=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/Write-Up-The-CIA-Triad.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d43258a0-336b-4b2c-9483-73d47a31448d\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/SCADA-Applications-to-Reduce-Cybersecurity-Risks.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SCADA-Applications-to-Reduce-Cybersecurity-Risks.\"><\/object><a id=\"wp-block-file--media-4780ac8f-2a3b-44b1-b51c-8b1c0b022d55\" href=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/SCADA-Applications-to-Reduce-Cybersecurity-Risks.pdf\">SCADA-Applications-to-Reduce-Cybersecurity-Risks<\/a><a href=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/SCADA-Applications-to-Reduce-Cybersecurity-Risks.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4780ac8f-2a3b-44b1-b51c-8b1c0b022d55\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/Write-Up-The-Human-Factor-in-Cybersecurity.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-Up-The-Human-Factor-in-Cybersecurity.\"><\/object><a id=\"wp-block-file--media-c8d17d14-8eac-44ab-b2fe-631400a8f26a\" href=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/Write-Up-The-Human-Factor-in-Cybersecurity.pdf\">Write-Up-The-Human-Factor-in-Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/owinifill\/wp-content\/uploads\/sites\/35744\/2024\/04\/Write-Up-The-Human-Factor-in-Cybersecurity.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c8d17d14-8eac-44ab-b2fe-631400a8f26a\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Reflecting on what I&#8217;ve learned in this cyber security class has been eye-opening. I never realized how many different areas intersect with cyber security\u2014like business, engineering, law, and even philosophy. In today&#8217;s increasingly digital world, where technology plays a central role in everything we do, it&#8217;s crucial for companies across all &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/owinifill\/it-cyse-200t-2\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">IT\/CYSE 200T<\/span><\/a><\/p>\n","protected":false},"author":28596,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/owinifill\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/owinifill\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/owinifill\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/owinifill\/wp-json\/wp\/v2\/users\/28596"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/owinifill\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/owinifill\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/owinifill\/wp-json\/wp\/v2\/pages\/133\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/owinifill\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}