{"id":302,"date":"2026-01-27T22:32:17","date_gmt":"2026-01-27T22:32:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/patrickbays\/?page_id=302"},"modified":"2026-05-06T00:01:23","modified_gmt":"2026-05-06T00:01:23","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/patrickbays\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Course Material<\/h2>\n\n\n\n<p>The major assignment I completed during this course was a Cybersecurity Professional Career Paper. I had to write a two-page paper that examines how professionals in this field rely on social science research and social science principles in their careers.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/05\/Cybersecurity-Career-Professional-Paper-Patrick-Bays.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Cybersecurity-Career-Professional-Paper-Patrick-Bays<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Another assignment I worked on was an Article Review. I chose to write a paper on cyber deviance among adolescents.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/05\/Article-Review-Patrick-Bays.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Article-Review-Patrick-Bays<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Lastly, I worked on a Cybersecurity Case Study paper. I decided to write about the MGM Resorts Social Engineering Breach, as it involved important elements of social cybersecurity in the days and hours leading to the breach.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/05\/Cybersecurity-Case-Study-Patrick-Bays.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Cybersecurity-Case-Study-Patrick-Bays<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>I also worked on a Cybersecurity Presentation Assignment, Cybersecurity in Smart Cities. I cannot upload the video due to the file length limit, but I can upload the presentation itself.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/05\/Cybersecurity-in-Smart-Cities-Patrick-Bays.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Cybersecurity-in-Smart-Cities-Patrick-Bays<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><br><br>In addition to these papers, I had to add the following three images and descriptors to my portfolio for the class.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/10588_2020_9322_Fig1_HTML-1024x577.png\" alt=\"\" class=\"wp-image-306\" srcset=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/10588_2020_9322_Fig1_HTML-1024x577.png 1024w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/10588_2020_9322_Fig1_HTML-300x169.png 300w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/10588_2020_9322_Fig1_HTML-768x433.png 768w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/10588_2020_9322_Fig1_HTML-533x300.png 533w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/10588_2020_9322_Fig1_HTML.png 1381w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">An image showing the interconnectedness of Interdisciplinary professions, connecting to a variety of other disciplines.<\/figcaption><\/figure>\n\n\n\n<p>This image depicts my understanding of Cybersecurity and the Social Sciences, where every discipline is connected.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"863\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/1-s2.0-S2451958825000831-gr1_lrg-863x1024.jpg\" alt=\"\" class=\"wp-image-308\" srcset=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/1-s2.0-S2451958825000831-gr1_lrg-863x1024.jpg 863w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/1-s2.0-S2451958825000831-gr1_lrg-253x300.jpg 253w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/1-s2.0-S2451958825000831-gr1_lrg-768x911.jpg 768w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/1-s2.0-S2451958825000831-gr1_lrg-1295x1536.jpg 1295w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/1-s2.0-S2451958825000831-gr1_lrg.jpg 1560w\" sizes=\"(max-width: 863px) 100vw, 863px\" \/><figcaption class=\"wp-element-caption\">An image showing a Venn diagram of the intersections between Cybersecurity, Information Security, and Social Cybersecurity<\/figcaption><\/figure>\n\n\n\n<p>This image depicts my understanding of how Cybersecurity, Information Security, and Social Cybersecurity intersect within a more focused disciplinary context.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/Beyond-the-firewall-How-social-engineers-use-psychology-to-compromise-organizational-cybersecurity.jpg\" alt=\"\" class=\"wp-image-309\" srcset=\"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/Beyond-the-firewall-How-social-engineers-use-psychology-to-compromise-organizational-cybersecurity.jpg 800w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/Beyond-the-firewall-How-social-engineers-use-psychology-to-compromise-organizational-cybersecurity-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/Beyond-the-firewall-How-social-engineers-use-psychology-to-compromise-organizational-cybersecurity-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/patrickbays\/wp-content\/uploads\/sites\/35876\/2026\/01\/Beyond-the-firewall-How-social-engineers-use-psychology-to-compromise-organizational-cybersecurity-533x300.jpg 533w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">An image showing multiple human figures with lines drawn to one another.<\/figcaption><\/figure>\n\n\n\n<p>This image, although less descriptive, depicts the more human element of Cybersecurity and the Social Sciences &#8211; one that literally cannot be ignored when talking about Cybersecurity in a social context.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Material The major assignment I completed during this course was a Cybersecurity Professional Career Paper. I had to write a two-page paper that examines how professionals in this field rely on social science research and social science principles in their careers. Another assignment I worked on was an Article Review. I chose to write&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/patrickbays\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":28671,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-json\/wp\/v2\/pages\/302"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-json\/wp\/v2\/users\/28671"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-json\/wp\/v2\/pages\/302\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-json\/wp\/v2\/pages\/302\/revisions\/364"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/patrickbays\/wp-json\/wp\/v2\/media?parent=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}