{"id":231,"date":"2022-01-30T19:35:44","date_gmt":"2022-01-30T19:35:44","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=231"},"modified":"2024-12-09T02:01:27","modified_gmt":"2024-12-09T02:01:27","slug":"ece-416","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/ece-416\/","title":{"rendered":"IT 418"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-d4632a71551a7ad3ef193ca653bce4e2\">Enterprise Information Assurance<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-5c5a88530ad0b197508f317e413cfeb4\">In my IT 418 Enterprise Information Assurance course, taught by Dr. Xianrong (Shawn) Zheng during the Fall 2024 semester, I explored the essential components of cybersecurity and risk management. This course focused on the critical aspects of securing information, covering topics such as IT security management, software security, and the legal and ethical dimensions of cybersecurity. My assignments allowed me to explore concepts such as the distinction between software quality and reliability, as well as defensive programming techniques. Engaging in collaborative discussions with classmates enriched my learning experience and helped me grasp the complexities of information assurance.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-5cf18840b56d402dca6e4104795593ce\">The course not only enhanced my technical expertise but also taught me the significance of meticulous attention to detail and effective communication within the realm of cybersecurity. These skills are vital as I aim to pursue a career that demands a robust understanding of technology and its implications for security and privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-2d91630a08baf39900c8c872ee656d87\">Course Materials<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e4fd68f7780a8b6c59a4466a7e8c7340\">Throughout this course, I comprehensively understood various cybersecurity principles and practices. I honed my skills in analytical reasoning and technical writing, particularly through two significant homework assignments. The first assignment required me to differentiate between software quality and software security, define defensive programming, and classify computer crimes based on the role of computers in criminal activities. The second assignment deepened my knowledge of IT security management, where I defined key terms such as security controls and the differences between passive and active security threats. These experiences were invaluable as they equipped me with the foundational knowledge necessary for a career in cybersecurity and highlighted the importance of a proactive approach to information assurance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-c00d51c139f29e72db10d4bcfefc4c41\">Homework Assignment on IT Security Management <\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-090429643047b8f9ca46a115166314a8\">This assignment reflects my grasp of IT security management principles, including the definitions of security control, consequence, and likelihood. It highlights my analytical skills in identifying the steps for selecting and implementing security controls, reinforcing my understanding of active versus passive security threats.&nbsp;<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-content\/uploads\/sites\/28441\/2024\/11\/IT418_-HW-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of IT418_-HW-2.\"><\/object><a id=\"wp-block-file--media-acfdd6bb-44ef-4a35-8a91-a1c7fbd18067\" href=\"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-content\/uploads\/sites\/28441\/2024\/11\/IT418_-HW-2.pdf\">IT418_-HW-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-content\/uploads\/sites\/28441\/2024\/11\/IT418_-HW-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-acfdd6bb-44ef-4a35-8a91-a1c7fbd18067\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-b1802d581952c75d7dfec8cf798d1d27\">Homework Assignment on Software Security<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f9c1fafd18b57584f7e9b623dc7db607\">This assignment showcases my understanding of crucial software security concepts, such as the differences between software quality and reliability, and the significance of defensive programming. It illustrates my ability to articulate complex ideas clearly and demonstrates my growth in technical writing.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-content\/uploads\/sites\/28441\/2024\/11\/IT418_-HW-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of IT418_-HW-3.\"><\/object><a id=\"wp-block-file--media-62dae99c-23c3-456c-9fa1-1426fc4ec798\" href=\"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-content\/uploads\/sites\/28441\/2024\/11\/IT418_-HW-3.pdf\">IT418_-HW-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-content\/uploads\/sites\/28441\/2024\/11\/IT418_-HW-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-62dae99c-23c3-456c-9fa1-1426fc4ec798\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise Information Assurance In my IT 418 Enterprise Information Assurance course, taught by Dr. Xianrong (Shawn) Zheng during the Fall 2024 semester, I explored the essential components of cybersecurity and risk management. This course focused on the critical aspects of securing information, covering topics such as IT security management, software security, and the legal and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ruthabeselom\/ece-416\/\">Read More<\/a><\/div>\n","protected":false},"author":23407,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-json\/wp\/v2\/pages\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-json\/wp\/v2\/users\/23407"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"predecessor-version":[{"id":557,"href":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-json\/wp\/v2\/pages\/231\/revisions\/557"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ruthabeselom\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}