{"id":90,"date":"2025-12-08T17:25:13","date_gmt":"2025-12-08T17:25:13","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cbass007\/?page_id=90"},"modified":"2025-12-10T15:14:07","modified_gmt":"2025-12-10T15:14:07","slug":"research-projects","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cbass007\/research-projects\/","title":{"rendered":"Cybersecurity Research Papers &amp; Projects"},"content":{"rendered":"\n<p> E-Portfolio Reflection Essay<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Reflection-Essay_-My-Cybersecurity-Journey-and-Interdisciplinary-Growth-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of E-Portfolio Reflection Essay.\"><\/object><a id=\"wp-block-file--media-4c0d6bc9-f035-4a15-9bf5-c4e0cad93872\" href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Reflection-Essay_-My-Cybersecurity-Journey-and-Interdisciplinary-Growth-2.pdf\">E-Portfolio Reflection Essay<\/a><a href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Reflection-Essay_-My-Cybersecurity-Journey-and-Interdisciplinary-Growth-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4c0d6bc9-f035-4a15-9bf5-c4e0cad93872\">Download<\/a><\/div>\n\n\n\n<p>Social Implications of US National Cybersecurity Research Paper <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Social-Implications.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Social-Implications.\"><\/object><a id=\"wp-block-file--media-44a71f30-71cb-4a2b-a568-c6f5239a5ae3\" href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Social-Implications.pdf\">Social-Implications<\/a><a href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Social-Implications.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-44a71f30-71cb-4a2b-a568-c6f5239a5ae3\">Download<\/a><\/div>\n\n\n\n<p>Political Implications of Cyber Security Research Paper<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/National-Cybersecurity-Strategy.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of National Cybersecurity Strategy Paper.\"><\/object><a id=\"wp-block-file--media-575ed4d8-2fd9-4047-9e6d-0daa9df311ad\" href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/National-Cybersecurity-Strategy.docx.pdf\">National Cybersecurity Strategy Paper<\/a><a href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/National-Cybersecurity-Strategy.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-575ed4d8-2fd9-4047-9e6d-0daa9df311ad\">Download<\/a><\/div>\n\n\n\n<p>Ethical Hacking in Cybersecurity Project<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Assignment-4-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Ethical Hacking Project.\"><\/object><a id=\"wp-block-file--media-1fc4ed9d-68a9-4271-bd0d-6da29d04a73b\" href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Assignment-4-1-1.pdf\">Ethical Hacking Project<\/a><a href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Assignment-4-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1fc4ed9d-68a9-4271-bd0d-6da29d04a73b\">Download<\/a><\/div>\n\n\n\n<p>Network Security Sword and Shield in Cybersecurity Project<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Assignment-3-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Sword vs. Shield Network Security Project.\"><\/object><a id=\"wp-block-file--media-5703f023-cc5b-46ef-b160-dd237dbb5fdc\" href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Assignment-3-1.pdf\">Sword vs. Shield Network Security Project<\/a><a href=\"https:\/\/student.wp.odu.edu\/cbass007\/wp-content\/uploads\/sites\/35327\/2025\/12\/Assignment-3-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5703f023-cc5b-46ef-b160-dd237dbb5fdc\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>E-Portfolio Reflection Essay Social Implications of US National Cybersecurity Research Paper Political Implications of Cyber Security Research Paper Ethical Hacking in Cybersecurity Project Network Security Sword and Shield in Cybersecurity Project<\/p>\n","protected":false},"author":28373,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/pages\/90"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/users\/28373"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/comments?post=90"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/pages\/90\/revisions"}],"predecessor-version":[{"id":115,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/pages\/90\/revisions\/115"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/media?parent=90"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}