{"id":152,"date":"2022-08-29T18:27:19","date_gmt":"2022-08-29T18:27:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=152"},"modified":"2025-04-07T00:18:21","modified_gmt":"2025-04-07T00:18:21","slug":"crjs-405","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/crjs-405\/","title":{"rendered":"CYSE 425W"},"content":{"rendered":"\n<p>Preview: This class required to pick a policy, and write various paper discussing its implications on the real-world. I chose Cybersecurity Education, mainly for its extreme importance in areas that aren&#8217;t particularly familiar with information technology concepts and threats. Below are a few examples of my work in the class. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-CYSE425W-Paper-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Timmons-CYSE425W-Paper-1.\"><\/object><a id=\"wp-block-file--media-fdcccb05-b5a8-4a8a-a5ad-ec60e022bb4d\" href=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-CYSE425W-Paper-1.pdf\">Timmons-CYSE425W-Paper-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-CYSE425W-Paper-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-fdcccb05-b5a8-4a8a-a5ad-ec60e022bb4d\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-CYSE425W-Paper-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Timmons-CYSE425W-Paper-2.\"><\/object><a id=\"wp-block-file--media-946d15e1-7cbf-4a80-b99e-5407fa96a72a\" href=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-CYSE425W-Paper-2.pdf\">Timmons-CYSE425W-Paper-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-CYSE425W-Paper-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-946d15e1-7cbf-4a80-b99e-5407fa96a72a\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-Cybersecurity-Education-Policy-Paper-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Timmons-Cybersecurity-Education-Policy-Paper-3.\"><\/object><a id=\"wp-block-file--media-2765769b-d5c9-46c0-9489-68cfca7b3d12\" href=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-Cybersecurity-Education-Policy-Paper-3.pdf\">Timmons-Cybersecurity-Education-Policy-Paper-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-content\/uploads\/sites\/30086\/2025\/04\/Timmons-Cybersecurity-Education-Policy-Paper-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2765769b-d5c9-46c0-9489-68cfca7b3d12\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Preview: This class required to pick a policy, and write various paper discussing its implications on the real-world. I chose Cybersecurity Education, mainly for its extreme importance in areas that aren&#8217;t particularly familiar with information technology concepts and threats. Below are a few examples of my work in the class.<\/p>\n","protected":false},"author":24597,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-json\/wp\/v2\/pages\/152"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-json\/wp\/v2\/users\/24597"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-json\/wp\/v2\/pages\/152\/revisions"}],"predecessor-version":[{"id":523,"href":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-json\/wp\/v2\/pages\/152\/revisions\/523"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rstcyse200t\/wp-json\/wp\/v2\/media?parent=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}