{"id":133,"date":"2021-09-14T18:34:05","date_gmt":"2021-09-14T18:34:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2023-03-15T19:52:50","modified_gmt":"2023-03-15T19:52:50","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/shacarapitre\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity, Technology, and Society<\/h1>\n\n\n\n<p>In this course, I explored how technology is related to cybersecurity from an interdisciplinary perspective.\u00a0 We discussed how technologically-driven cybersecurity issues relate to cultural, political, legal, ethical, and business domains.\u00a0Our assignments consisted of discussion board posts, journal entries (found on my blog page), and an analytical paper. This course gave me an introduction into the field of cybersecurity and provided me with a solid foundation that helped me later when it came to building on these concepts in future classes. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-content\/uploads\/sites\/26031\/2023\/03\/cyse200-image-1024x683.jpeg\" alt=\"\" class=\"wp-image-384\" width=\"713\" height=\"475\" srcset=\"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-content\/uploads\/sites\/26031\/2023\/03\/cyse200-image-1024x683.jpeg 1024w, https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-content\/uploads\/sites\/26031\/2023\/03\/cyse200-image-300x200.jpeg 300w, https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-content\/uploads\/sites\/26031\/2023\/03\/cyse200-image-768x512.jpeg 768w, https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-content\/uploads\/sites\/26031\/2023\/03\/cyse200-image-960x640.jpeg 960w, https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-content\/uploads\/sites\/26031\/2023\/03\/cyse200-image-450x300.jpeg 450w, https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-content\/uploads\/sites\/26031\/2023\/03\/cyse200-image.jpeg 1200w\" sizes=\"(max-width: 713px) 100vw, 713px\" \/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>One assignment that stood out to me was the analytical paper which I completed at the end of this course. It is a combination of three of my journal entries (found on my blog), which draws together the work that I have done for this course. After completing the analytical paper, I learned that we should be weary of new technologies out there to keep companies secure, especially with predictive knowledge.<\/p>\n\n\n\n<p>Technology is <span style=\"font-weight: 400\">not always a good thing as data can be stolen, lost, or destroyed along with cybercriminals out there waiting for vulnerabilities. <\/span><span style=\"font-weight: 400\">That is why cybersecurity is vital to a company such as having the NIST Cybersecurity Framework. One of the many benefits is that it protects an organization\u2019s private information and keeps it confidential. Furthermore, I learned about the NIST Framework and the CIA Triad which are crucial to the security of an organization.&nbsp;<\/span><\/p>\n\n\n\n<p>Here, you will be able to view my Analytical Paper.&nbsp;<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-content\/uploads\/sites\/26031\/2023\/02\/Analytical-Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Analytical-Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society In this course, I explored how technology is related to cybersecurity from an interdisciplinary perspective.\u00a0 We discussed how technologically-driven cybersecurity issues relate to cultural, political, legal, ethical, and business domains.\u00a0Our assignments consisted of discussion board posts, journal entries (found on my blog page), and an analytical paper. This course gave me&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/shacarapitre\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":21864,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/users\/21864"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":386,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/pages\/133\/revisions\/386"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}