{"id":207,"date":"2021-01-20T20:58:54","date_gmt":"2021-01-20T20:58:54","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2024-12-09T02:40:57","modified_gmt":"2024-12-09T02:40:57","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/wayde001\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity Ethics<\/h1>\n\n\n\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reflection Paper<\/h2>\n\n\n\n<p>This paper was my overall review of knowledge that I had learned within the class, explaining how I will use my skills attained in the future.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/wayde001\/wp-content\/uploads\/sites\/22857\/2024\/12\/Untitled-document-20.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Untitled-document-20.\"><\/object><a id=\"wp-block-file--media-e5f11f44-198f-4255-b9bd-b971f18db619\" href=\"https:\/\/sites.wp.odu.edu\/wayde001\/wp-content\/uploads\/sites\/22857\/2024\/12\/Untitled-document-20.pdf\">Untitled-document-20<\/a><a href=\"https:\/\/sites.wp.odu.edu\/wayde001\/wp-content\/uploads\/sites\/22857\/2024\/12\/Untitled-document-20.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e5f11f44-198f-4255-b9bd-b971f18db619\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/wayde001\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":19727,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/users\/19727"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":393,"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/pages\/207\/revisions\/393"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/wayde001\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}