{"id":65,"date":"2026-01-25T18:09:18","date_gmt":"2026-01-25T18:09:18","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cargi001\/?page_id=65"},"modified":"2026-03-08T14:40:04","modified_gmt":"2026-03-08T14:40:04","slug":"cyse-425w-cybersecurity-strategy-and-policy","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cargi001\/cyse-425w-cybersecurity-strategy-and-policy\/","title":{"rendered":"CYSE 425W &#8211; Cybersecurity Strategy and Policy"},"content":{"rendered":"\n<p>Page Introduction<br>CYSE 425W: Cybersecurity Strategy and Policy provided a comprehensive examination of the policy dimensions of cybersecurity. Under Instructor Bora Aslan, this writing-intensive course challenged me to analyze cybersecurity issues through ethical, social, and policy frameworks.<\/p>\n\n\n\n<p>Course Overview<br>This course examined cybersecurity not merely as a technical challenge but as a complex policy domain requiring consideration of stakeholder interests, ethical implications, and societal impacts. The curriculum covered cybersecurity governance, risk management frameworks, and the development of security strategies at organizational and national levels.<\/p>\n\n\n\n<p>Artifact 1: Ethical Implications Analysis<br>I authored a comprehensive analysis of the ethical implications of a federal prohibition on ransomware payments by hospitals. Using a utilitarian framework, I evaluated how such a policy would affect multiple stakeholders including patients, healthcare organizations, and society at large. The paper examined the tension between immediate patient safety risks and long-term reduction in criminal incentives.<br>Skills Demonstrated:<\/p>\n\n\n<a href=\"https:\/\/student.wp.odu.edu\/cargi001\/wp-content\/uploads\/sites\/38141\/2026\/03\/CYSE425W_Ethical_Implications_Analysis.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE425W_Ethical_Implications_Analysis<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Application of ethical frameworks to cybersecurity policy<br>Scholarly research and integration of journal articles<br>Balanced stakeholder analysis<\/p>\n\n\n\n<p>Artifact 2: Social Implications Paper<br>Building on my ethical analysis, I examined the social factors that led to ransomware payment ban proposals, the social consequences such policies would create, and how cultural influences have shaped this policy debate. This paper incorporated scholarly journal articles to support analysis of healthcare cybersecurity trends and societal responses to ransomware threats.<\/p>\n\n\n<a href=\"https:\/\/student.wp.odu.edu\/cargi001\/wp-content\/uploads\/sites\/38141\/2026\/03\/CYSE425W_Social_Implications_Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE425W_Social_Implications_Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Reflection<br>CYSE 425W fundamentally shaped my understanding of cybersecurity as a discipline that extends far beyond technical implementation. The course taught me that effective security professionals must consider the broader implications of their work and communicate complex technical issues to diverse stakeholders. The writing-intensive nature of the course strengthened my ability to construct clear, well-supported arguments\u2014a skill essential for policy advocacy and professional communication.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Page IntroductionCYSE 425W: Cybersecurity Strategy and Policy provided a comprehensive examination of the policy dimensions of cybersecurity. Under Instructor Bora Aslan, this writing-intensive course challenged me to analyze cybersecurity issues through ethical, social, and policy frameworks. Course OverviewThis course examined&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/cargi001\/cyse-425w-cybersecurity-strategy-and-policy\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30381,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","wds_primary_avhec_catgroup":0},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/65"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/users\/30381"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/comments?post=65"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/65\/revisions"}],"predecessor-version":[{"id":101,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/65\/revisions\/101"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/media?parent=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}