
{"id":246,"date":"2026-04-07T19:02:46","date_gmt":"2026-04-07T19:02:46","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cjudy002\/?page_id=246"},"modified":"2026-04-07T19:02:46","modified_gmt":"2026-04-07T19:02:46","slug":"cyse-425w","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cjudy002\/cyse-425w\/","title":{"rendered":"CYSE 425W"},"content":{"rendered":"\n<p><strong>Cybersecurity Strategy and Policy<\/strong><\/p>\n\n\n\n<p>Explored cybersecurity policy and strategy and learned the essentials of strategy development and policy making in cybersecurity. Discussed the topics of planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy. <\/p>\n\n\n\n<p><strong>Met the following learning objectives: <\/strong><\/p>\n\n\n\n<ul>\n<li>Can describe the goal and structure of a national security strategy and compare it to cybersecurity strategy.<\/li>\n\n\n\n<li>Can critically communicate the political and social implications that arise with cybersecurity policies and strategies.<\/li>\n\n\n\n<li>Compared and interpreted cybersecurity policy issues and make recommendations on policy choices.<\/li>\n\n\n\n<li>Identified international cyber crisis management and conflict resolution mechanisms.<\/li>\n\n\n\n<li>Debated ethical issues that arise with cybersecurity policies<\/li>\n\n\n\n<li>Identified possible developments in cybersecurity strategy and policy.<\/li>\n\n\n\n<li>Assessed cybersecurity strategy and policy<\/li>\n<\/ul>\n\n\n\n<p><strong>Coursework<\/strong><\/p>\n\n\n<a href=\"https:\/\/student.wp.odu.edu\/cjudy002\/wp-content\/uploads\/sites\/31905\/2026\/04\/GDPRAnalysis.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">GDPRAnalysis<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Strategy and Policy Explored cybersecurity policy and strategy and learned the essentials of strategy development and policy making in<\/p>\n<div class=\"read-button read_more_btn_text\"><a class=\"read_more\" href=\"https:\/\/student.wp.odu.edu\/cjudy002\/cyse-425w\/\">Read Now<span class=\"arrow_readm\"> &#x25BA;<\/span><\/a><\/div>\n","protected":false},"author":25776,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/246"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/users\/25776"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/246\/revisions"}],"predecessor-version":[{"id":248,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/246\/revisions\/248"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/media?parent=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}