{"id":133,"date":"2025-05-29T17:54:57","date_gmt":"2025-05-29T17:54:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-06-05T22:05:51","modified_gmt":"2025-06-05T22:05:51","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<p><strong>Discussion Board: The NIST Cybersecurity Framework<a href=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-admin\/post.php?post=295&amp;action=edit\"><\/a><\/strong><\/p>\n\n\n\n<p>If all organizations utilize all three components of Framework\u2019s system, they minimize their chances of experiencing security breaches and assessing their risks and data management more efficiently. Specifically, by developing a Target Profile using the Tiers scale, it will \u201cinfluence prioritization within a Target Profile and assessments of progress in addressing gaps,\u201d (Cybersecurity Framework, pg. 9).<\/p>\n\n\n\n<p>If I were to use this Framework for my future workplace, I would identify my companies cybersecurity goals, missions, and potential outcomes with the Core categories and subcategories and make a Current and Target Profile to track the company\u2019s progress while prioritizing the Tiers scale to set an overall tone for the company\u2019s cybersecurity goals.<\/p>\n\n\n\n<p><strong>Write Up: Components of a Business<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-content\/uploads\/sites\/39133\/2025\/06\/The-Components-of-a-Business-and-How-IT-Plays-an-Integral-Role-in-Maintaining-a-Business-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-Components-of-a-Business-and-How-IT-Plays-an-Integral-Role-in-Maintaining-a-Business-.\"><\/object><a id=\"wp-block-file--media-b71a5754-6378-4f0f-a157-5e4891ccaca1\" href=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-content\/uploads\/sites\/39133\/2025\/06\/The-Components-of-a-Business-and-How-IT-Plays-an-Integral-Role-in-Maintaining-a-Business-.pdf\">The-Components-of-a-Business-and-How-IT-Plays-an-Integral-Role-in-Maintaining-a-Business-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-content\/uploads\/sites\/39133\/2025\/06\/The-Components-of-a-Business-and-How-IT-Plays-an-Integral-Role-in-Maintaining-a-Business-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b71a5754-6378-4f0f-a157-5e4891ccaca1\">Download<\/a><\/div>\n\n\n\n<p><strong>Discussion Board: Protecting Availability<\/strong><a href=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-admin\/post.php?post=303&amp;action=edit\"><\/a><\/p>\n\n\n\n<p>I would enforce a policy for all my employees to use strong passwords that would make it more difficult for any outside forces to access sensitive information within the company. Alongside using strong passwords, I would require all employees to use a two-factor authorization token such as sending a text to their phone or scan a QR code that is exclusive to their accounts. I believe these are the two easiest, but strongest methods of protecting the availability of my systems because it would allow for easy accessibility for employees, but make accessibility increasingly difficult for outside users.<\/p>\n\n\n\n<p><strong>Write Up: The CIA Triad<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-content\/uploads\/sites\/39133\/2025\/06\/The-CIA-Triad_-Keeping-Your-Organizations-Information-Safe.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-CIA-Triad_-Keeping-Your-Organizations-Information-Safe.\"><\/object><a id=\"wp-block-file--media-eca5cd8f-8c90-40f0-81e8-b917d435a4e7\" href=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-content\/uploads\/sites\/39133\/2025\/06\/The-CIA-Triad_-Keeping-Your-Organizations-Information-Safe.pdf\">The-CIA-Triad_-Keeping-Your-Organizations-Information-Safe<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-content\/uploads\/sites\/39133\/2025\/06\/The-CIA-Triad_-Keeping-Your-Organizations-Information-Safe.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-eca5cd8f-8c90-40f0-81e8-b917d435a4e7\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discussion Board: The NIST Cybersecurity Framework If all organizations utilize all three components of Framework\u2019s system, they minimize their chances of experiencing security breaches and assessing their risks and data management more efficiently. Specifically, by developing a Target Profile using the Tiers scale, it will \u201cinfluence prioritization within a Target Profile and assessments of progress&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27782,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-json\/wp\/v2\/users\/27782"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":318,"href":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-json\/wp\/v2\/pages\/133\/revisions\/318"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rotellacyse200202430\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}