{"id":595,"date":"2022-04-26T02:58:19","date_gmt":"2022-04-26T02:58:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/wjacob\/?page_id=595"},"modified":"2024-05-01T18:46:04","modified_gmt":"2024-05-01T18:46:04","slug":"journal-number-07","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-07\/","title":{"rendered":"JOURNAL NUMBER 07"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; specialty=&#8221;on&#8221; admin_label=&#8221;Document&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#F6F2EA&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; specialty_columns=&#8221;3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_row_inner _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column_inner saved_specialty_column_type=&#8221;3_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;e864d11f-3dab-4fa3-ac06-4f0e1a260807&#8243; header_font=&#8221;Archivo|600|||||||&#8221; header_text_color=&#8221;#010101&#8243; header_font_size=&#8221;80px&#8221; header_line_height=&#8221;1.2em&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Cybersecurity Programs<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;5ff55506-da7d-4dd7-b409-9d62c7203201&#8243; text_font=&#8221;Archivo||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; link_text_color=&#8221;rgba(221,221,221,0.57)&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ol>\n<li><b> What are the costs and benefits of developing cybersecurity programs in business?<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">Companies use a wide range of sophisticated technologies and procedures to safeguard key corporate assets. However, trust is the most critical aspect in any cybersecurity operation. It serves as the foundation for all decisions made by executives regarding tools, talent, and procedures. However, based on our experience, trust is often missing in many businesses&#8217; cybersecurity activities, owing to competing objectives. Senior corporate leaders and the board may prioritize cybersecurity only when an attack happens, but the chief security officer and his team prioritize security on a daily basis, as even the most ordinary internet transactions provide possible flaws to be exploited.<\/span><\/p>\n<p><b>Why should you budget for cybersecurity?<\/b><\/p>\n<p><span style=\"font-weight: 400\">Cybersecurity is an issue that impacts organizations of all sizes, including small ones. In reality, about half of all cyberattacks target small firms, and 68 percent of small enterprises have faced a cyberattack in the recent 12 months. In addition to merely safeguarding your organization against the expense and interruption of a cyberattack, businesses use cybersecurity programs for a variety of reasons:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400\"> Pressure from their board of directors or other stakeholders for greater prioritization and use of daily cybersecurity measures.<\/span><\/li>\n<li><span style=\"font-weight: 400\"> Third-party cybersecurity risk assessments and other vendor requirements, which are becoming more widespread and more a component of contractual considerations.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400\"> Compliance standards (for example, GDPR, PCI, and HIPAA) and national or state rules requiring businesses to meet cybersecurity standards.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400\"> The requirement for a competitive edge in major projects or contracts<\/span><\/li>\n<\/ol>\n<p><b>What is the cost of a data breach?<\/b><\/p>\n<p><span style=\"font-weight: 400\">The expenses of a cyberattack might vary greatly, but they are unquestionably enormous. According to recent research, the average cost of a data breach to a small business can range from $120,000 to $1.24 million. And that is absolutely restricted to the small company sector. Moving beyond the small business filter, IBM&#8217;s 2019 Cost of a Data Breach Report recently discovered that the average cost of a data breach was $3.92 million, indicating that breaches cost smaller organizations more in relation to their size than large businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It is critical to remember that the actual cost of a data breach isn&#8217;t necessarily what it appears to be. Expenses can be spread out over time, with around one-third occurring beyond the first year following the breach. A data breach has a wide range of costs, some of which are evident and repairable, while others are more ambiguous and\/or irreversible.<\/span><\/p>\n<p><b>How much money should you invest in cybersecurity?<\/b><\/p>\n<p><span style=\"font-weight: 400\">There are several aspects that determine how you establish a cybersecurity budget, just as there are with any other aspect of company. Consider the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Your business&#8217;s industry and size<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Mandates affecting your business in terms of compliance and regulation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">The importance of the data you acquire, utilize, and share<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Requests from stakeholders or consumers of the firm<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The real amount that businesses spend on cybersecurity is frequently linked to their IT budget, which accounts for company size and IT infrastructure. Estimates of what corporations are presently paying range from an additional 5.6 percent to up to 20 percent of overall IT cost. Assume a 40-person business pays $3,000 per month to an IT managed service provider to fulfill its IT needs. Their cybersecurity budget would be between $168 and $600 per month \u2013 a sizable but not insurmountable sum that would be well worth it given the potential cost of a cyberattack.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-01\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Introduction to Cybersecurity&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-02\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Careers in Cybersecurity&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-03\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Ethical Issues&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-04\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Cyberecurity Risks&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_style=&#8221;preset4&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-05\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Ways to make money&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-06\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Cyber Technology&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-10\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Cybersecurity Engineers&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/e-portfolio-entry-04\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Cybersecurity Impacts&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/e-portfolio-entry\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Computer Safety&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/e-portfolio-entry-05\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Cybersecurity Policy&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;026389c6-8201-4c4e-95e0-3df22460691c&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0C71C3&#8243; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Archivo|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;5px|24px|5px|24px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; box_shadow_style=&#8221;preset7&#8243; box_shadow_horizontal=&#8221;0px&#8221; box_shadow_vertical=&#8221;160px&#8221; box_shadow_color=&#8221;#F6F2EA&#8221; global_module=&#8221;749&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#544fff&#8221; custom_margin=&#8221;||30px||false|false&#8221; custom_padding=&#8221;50px|60px|50px|60px|true|true&#8221; custom_padding_tablet=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;4px&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;6px&#8221; box_shadow_vertical=&#8221;6px&#8221; box_shadow_color=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Archivo|600|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span>Stay connected.<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Archivo|500|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Welcome to a platform where cybersecurity becomes more than a skill\u2014it&#8217;s a passion. Let&#8217;s embark on this transformative journey together. Welcome aboard, Cyber Defender!<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/sites.wp.odu.edu\/wjacob\/contact\/&#8221; button_text=&#8221;Learn More&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;94ef7aca-dcd9-4f9d-93b2-efa3466cebc7&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#000000&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;4px&#8221; button_border_color=&#8221;#000000&#8243; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Archivo|800||on|||||&#8221; custom_padding=&#8221;15px|35px|15px|35px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;6px&#8221; box_shadow_vertical=&#8221;6px&#8221; box_shadow_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_6,1_6,1_6,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Archivo|700||on|||||&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>PHIL 355E<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;5ff55506-da7d-4dd7-b409-9d62c7203201&#8243; text_font=&#8221;Archivo||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; link_text_color=&#8221;rgba(221,221,221,0.57)&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/case-analysis-on-professional-ethics\/\" target=\"_top\" rel=\"noopener\">Case Analysis on Professional Ethics<\/a><\/p>\n<p><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/privacy-google-street-view-case-analysis\/\">Privacy: Google Street View Case Analysis<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Archivo|700||on|||||&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Cyse 201s<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;5ff55506-da7d-4dd7-b409-9d62c7203201&#8243; text_font=&#8221;Archivo||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; link_text_color=&#8221;rgba(221,221,221,0.57)&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/537-2\/\">Coming Soon!<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Archivo|700||on|||||&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Cyse 200t<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;5ff55506-da7d-4dd7-b409-9d62c7203201&#8243; text_font=&#8221;Archivo||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; link_text_color=&#8221;rgba(221,221,221,0.57)&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-01\/\">Introduction to Cybersecurity<\/a><br \/><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-02\/\">Careers in Cybersecurity<\/a><br \/><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-03\/\">Ethical Issues<\/a><\/p>\n<p><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-04\/\">Cybersecurity Risks<\/a><br \/><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-05\/\">Ways to Make Money<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Archivo|700||on|||||&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Cyse 200t<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;5ff55506-da7d-4dd7-b409-9d62c7203201&#8243; text_font=&#8221;Archivo||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; link_text_color=&#8221;rgba(221,221,221,0.57)&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-07\/\">Cybersecurity Programs<\/a><br \/><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-10\/\">Cybersecurity Engineers<\/a><br \/><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/e-portfolio-entry\/\">Cybersecurity Impacts<\/a><\/p>\n<p><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/e-portfolio-entry-03\/\">Computer Safety<\/a><br \/><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/e-portfolio-entry-04\/\">Cybersecurity Policy<\/a><\/p>\n<p><a href=\"https:\/\/sites.wp.odu.edu\/wjacob\/journal-number-06\/\">Cyber Technology<\/a><\/p>\n<p>[\/et_pb_text][et_pb_social_media_follow _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_social_media_follow_network social_network=&#8221;dribbble&#8221; icon_color=&#8221;rgba(160,160,160,0.86)&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; background_enable_color=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]dribbble[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;facebook&#8221; icon_color=&#8221;rgba(160,160,160,0.86)&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; background_enable_color=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;twitter&#8221; icon_color=&#8221;rgba(160,160,160,0.86)&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; background_enable_color=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]twitter[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;rgba(255,255,255,0.3)&#8221; border_width_top=&#8221;1px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _dynamic_attributes=&#8221;content&#8221; _module_preset=&#8221;default&#8221; text_font=&#8221;Archivo||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoiY3VycmVudF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiQ29weXJpZ2h0IFx1MDBhOSAiLCJhZnRlciI6IiBXaWxvbmRqYSBKYWNvYiIsImRhdGVfZm9ybWF0IjoiY3VzdG9tIiwiY3VzdG9tX2RhdGVfZm9ybWF0IjoiWSJ9fQ==@[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Programs What are the costs and benefits of developing cybersecurity programs in business? Companies use a wide range of sophisticated technologies and procedures to safeguard key corporate assets. However, trust is the most critical aspect in any cybersecurity operation. It serves as the foundation for all decisions made by executives regarding tools, talent, and [&hellip;]<\/p>\n","protected":false},"author":21182,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/wjacob\/wp-json\/wp\/v2\/pages\/595"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/wjacob\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/wjacob\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/wjacob\/wp-json\/wp\/v2\/users\/21182"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/wjacob\/wp-json\/wp\/v2\/comments?post=595"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/wjacob\/wp-json\/wp\/v2\/pages\/595\/revisions"}],"predecessor-version":[{"id":809,"href":"https:\/\/sites.wp.odu.edu\/wjacob\/wp-json\/wp\/v2\/pages\/595\/revisions\/809"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/wjacob\/wp-json\/wp\/v2\/media?parent=595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}