
{"id":249,"date":"2026-04-07T19:14:18","date_gmt":"2026-04-07T19:14:18","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cjudy002\/?page_id=249"},"modified":"2026-04-07T19:14:18","modified_gmt":"2026-04-07T19:14:18","slug":"cs-465","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cjudy002\/cs-465\/","title":{"rendered":"CS 465"},"content":{"rendered":"\n<p><strong>Information Assurance for Cybersecurity <\/strong><\/p>\n\n\n\n<p><strong>Met the following learning objectives: <\/strong><\/p>\n\n\n\n<ul>\n<li>Can recognize the general purpose and goals of the online course<\/li>\n\n\n\n<li>Can explain the need and role of information assurance (IA) in corporate and national security<\/li>\n\n\n\n<li>Discerned the threats, vulnerabilities, and risks that an information system is exposed to<\/li>\n\n\n\n<li>Analyzed the Information assurance needs of an organization<\/li>\n\n\n\n<li>Identified models to express the IA needs of an organization<\/li>\n\n\n\n<li>Identified measures to express the efficacy of an information system\u2019s assurance capability<\/li>\n\n\n\n<li>Identified privacy and security regulations of a given organization<\/li>\n\n\n\n<li>Discerned the legal, ethical, and social implications of an organization\u2019s IA strategies<\/li>\n\n\n\n<li>Identified and analyze potential vulnerabilities in a system<\/li>\n\n\n\n<li>Explained techniques for detecting intrusions (internal or external)<\/li>\n\n\n\n<li>Identified techniques for a system to survive any potential attacks<\/li>\n\n\n\n<li>Matched IA needs of an organization with the available technologies<\/li>\n<\/ul>\n\n\n\n<p><strong>Coursework<\/strong><\/p>\n\n\n\n<p>Wrote information assurance policies and recommendations for hypothetical company, &#8220;ABC inc.&#8221;. ABC Inc. recently suffered from a ransomware attack I took on the role as the Chief Information Assurance Officer (CIAO) to create a set of information assurance (IA) policies and procedures to reduce the risk of company disruption and of internal proprietary information being compromised again. I was tasked with writing a report about what happened, some of the apparent consequences of the breach, and policies and procedures to be put in place to reduce the likelihood of future incidents.<\/p>\n\n\n<a href=\"https:\/\/student.wp.odu.edu\/cjudy002\/wp-content\/uploads\/sites\/31905\/2026\/04\/infoassurance.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">infoassurance<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Assurance for Cybersecurity Met the following learning objectives: Coursework Wrote information assurance policies and recommendations for hypothetical company, &#8220;ABC<\/p>\n<div class=\"read-button read_more_btn_text\"><a class=\"read_more\" href=\"https:\/\/student.wp.odu.edu\/cjudy002\/cs-465\/\">Read Now<span class=\"arrow_readm\"> &#x25BA;<\/span><\/a><\/div>\n","protected":false},"author":25776,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/249"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/users\/25776"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/249\/revisions"}],"predecessor-version":[{"id":251,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/249\/revisions\/251"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/media?parent=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}