{"id":133,"date":"2024-01-26T01:19:16","date_gmt":"2024-01-26T01:19:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-04-18T20:53:49","modified_gmt":"2024-04-18T20:53:49","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<p class=\"has-x-large-font-size\"><strong>COURSE MARTERIAL<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Discussion Borad<\/strong><\/p>\n\n\n\n<p>Q: How has cyber technology created opportunities for workplace deviance?<\/p>\n\n\n\n<p>Response: It created opportunities for by increasing networking and accessible information. Employees could get involved in cyber-threat actives like data breaches, unauthorized access to any sensitive information, or even cyber bullying. Thats why organizations\/companies make it a priority to have strong security measures, to prevent this behavior of any kind.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Write Up- The Human Factor in Cybersecurity <\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-content\/uploads\/sites\/35629\/2024\/04\/annotated-The20Human20Factor20in20cybersecurity.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Embed of annotated-The20Human20Factor20in20cybersecurity.docx.\"><\/object><a id=\"wp-block-file--media-b92f68d5-6608-458c-aea5-3e49f04b69b7\" href=\"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-content\/uploads\/sites\/35629\/2024\/04\/annotated-The20Human20Factor20in20cybersecurity.docx.pdf\">annotated-The20Human20Factor20in20cybersecurity.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-content\/uploads\/sites\/35629\/2024\/04\/annotated-The20Human20Factor20in20cybersecurity.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b92f68d5-6608-458c-aea5-3e49f04b69b7\">Download<\/a><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>In-Class Group Assignment <\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-content\/uploads\/sites\/35629\/2024\/04\/Insider-Threats.pdf\" type=\"application\/pdf\" style=\"width:100%;height:260px\" aria-label=\"Embed of Insider-Threats.\"><\/object><a id=\"wp-block-file--media-0dd9a5c3-e5c8-4e60-826b-576f6eebf102\" href=\"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-content\/uploads\/sites\/35629\/2024\/04\/Insider-Threats.pdf\">Insider-Threats<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-content\/uploads\/sites\/35629\/2024\/04\/Insider-Threats.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0dd9a5c3-e5c8-4e60-826b-576f6eebf102\">Download<\/a><\/div>\n\n\n\n<p class=\"has-x-large-font-size\"><strong>FEEDBACK<\/strong><\/p>\n\n\n\n<p>The professor in CYSE 200T was not only very understanding and clear, but he also improved my knowledge of cybercrime, cyberthreats, and various approaches to handling such situations. Overall, the class was quite fascinating. We were given access to documents that, in the future, would come in useful as Chief Information Security Officers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>COURSE MARTERIAL Discussion Borad Q: How has cyber technology created opportunities for workplace deviance? Response: It created opportunities for by increasing networking and accessible information. Employees could get involved in cyber-threat actives like data breaches, unauthorized access to any sensitive information, or even cyber bullying. Thats why organizations\/companies make it a priority to have strong&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28532,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-json\/wp\/v2\/users\/28532"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-json\/wp\/v2\/pages\/133\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ramatu-hallie\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}