{"id":133,"date":"2024-09-04T15:24:09","date_gmt":"2024-09-04T15:24:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-12-01T18:25:48","modified_gmt":"2024-12-01T18:25:48","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/treynolds2028\/it-cyse-200t-2\/","title":{"rendered":"Ethical Insights in Cybersecurity: A Journey Through CYSE 200T"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\"> The CIA Triad: Unlocking the Secrets of Authentication and Authorization<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/cia-triad.svg\" alt=\"\" class=\"wp-image-333\" \/><\/figure><\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-center\">&nbsp;&nbsp;This report explores the CIA Triad, detailing its components and their specific roles, and &nbsp;distinguishes between authentication and authorization in systems or organizations. It highlights the significance of grasping these concepts to ensure user information remains secure, thereby maintaining the organization&#8217;s reliability.<\/p>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/docs.google.com\/document\/d\/1PmVXxAhjjWUKNo_2lDHMfJsc4C5CvdFQgZlRryh27cg\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1PmVXxAhjjWUKNo_2lDHMfJsc4C5CvdFQgZlRryh27cg\/edit?usp=sharing\"><strong>https:\/\/docs.google.com\/document\/d\/1PmVXxAhjjWUKNo_2lDHMfJsc4C5CvdFQgZlRryh27cg\/edit?usp=sharing<\/strong><\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Guardians of the Grid: Securing Critical Infrastructure from Cyber Threats<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/AdobeStock_552777398-scaled-1-1024x683.jpeg\" alt=\"\" class=\"wp-image-334\" srcset=\"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/AdobeStock_552777398-scaled-1-1024x683.jpeg 1024w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/AdobeStock_552777398-scaled-1-300x200.jpeg 300w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/AdobeStock_552777398-scaled-1-768x512.jpeg 768w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/AdobeStock_552777398-scaled-1-1536x1024.jpeg 1536w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/AdobeStock_552777398-scaled-1-2048x1366.jpeg 2048w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/AdobeStock_552777398-scaled-1-960x640.jpeg 960w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/AdobeStock_552777398-scaled-1-450x300.jpeg 450w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-center\">Critical infrastructure systems, like power grids and transportation networks, are at risk of cyber-attacks due to vulnerabilities in SCADA systems. These systems need robust security measures to protect against threats and ensure the smooth operation of essential services.&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-center\"><a href=\"https:\/\/docs.google.com\/document\/d\/1HIgVuExm_yp0QGnjs_N5szRRZSvg4-cI6jBDuF9dlwQ\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1HIgVuExm_yp0QGnjs_N5szRRZSvg4-cI6jBDuF9dlwQ\/edit?usp=sharing\"><strong>https:\/\/docs.google.com\/document\/d\/1HIgVuExm_yp0QGnjs_N5szRRZSvg4-cI6jBDuF9dlwQ\/edit?usp=sharing<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Greg Tomchick: From Failing Out To Becoming An Successful Eye Opener For The Importance of CyberSecurity<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/maxresdefault-1024x576.jpg\" alt=\"\" class=\"wp-image-335\" srcset=\"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/maxresdefault-1024x576.jpg 1024w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/maxresdefault-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/maxresdefault-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/maxresdefault-533x300.jpg 533w, https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-content\/uploads\/sites\/36789\/2024\/12\/maxresdefault.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-center\">Cybersecurity involves establishing a framework, performing security measures, testing<br>systems, optimizing processes, and sharing a unique security story to build trust and<br>compliance. However, the field can be a struggle without utilizing opportunities and maximizing<br>individual effort.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\"><a href=\"https:\/\/docs.google.com\/document\/d\/1t9UUtNmh80VXhlYDxLnzNTAG3zYhCk1dmHxM4lXZZnA\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1t9UUtNmh80VXhlYDxLnzNTAG3zYhCk1dmHxM4lXZZnA\/edit?usp=sharing\"><strong>https:\/\/docs.google.com\/document\/d\/1t9UUtNmh80VXhlYDxLnzNTAG3zYhCk1dmHxM4lXZZnA\/edit?usp=sharing<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad: Unlocking the Secrets of Authentication and Authorization &nbsp;&nbsp;This report explores the CIA Triad, detailing its components and their specific roles, and &nbsp;distinguishes between authentication and authorization in systems or organizations. It highlights the significance of grasping these concepts to ensure user information remains secure, thereby maintaining the organization&#8217;s reliability. https:\/\/docs.google.com\/document\/d\/1PmVXxAhjjWUKNo_2lDHMfJsc4C5CvdFQgZlRryh27cg\/edit?usp=sharing Guardians of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/treynolds2028\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29523,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-json\/wp\/v2\/users\/29523"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":336,"href":"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-json\/wp\/v2\/pages\/133\/revisions\/336"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/treynolds2028\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}