{"id":286,"date":"2026-02-05T17:15:54","date_gmt":"2026-02-05T17:15:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/?page_id=286"},"modified":"2026-02-05T18:50:50","modified_gmt":"2026-02-05T18:50:50","slug":"cyse-201s-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/cyse-201s-2\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"767\" src=\"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cyber_Resources_Diversity-1024x767.jpg\" alt=\"\" class=\"wp-image-299\" style=\"width:449px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cyber_Resources_Diversity-1024x767.jpg 1024w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cyber_Resources_Diversity-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cyber_Resources_Diversity-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cyber_Resources_Diversity-1536x1151.jpg 1536w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cyber_Resources_Diversity-400x300.jpg 400w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cyber_Resources_Diversity.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<pre class=\"wp-block-preformatted\">Credit: Thomas Barwick\/ Stone\/ Getty Images <\/pre>\n\n\n\n<p>Diversity and inclusivity matters within the cybersecurity and social sciences field. It is important to have these different perspectives within the field. These attackers are coming from all different social backgrounds not just one gender, ethnicity or religion. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/gfsr-ch3-cyber-threats-chart1-v3-1024x1024.png\" alt=\"\" class=\"wp-image-302\" style=\"width:501px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/gfsr-ch3-cyber-threats-chart1-v3-1024x1024.png 1024w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/gfsr-ch3-cyber-threats-chart1-v3-300x300.png 300w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/gfsr-ch3-cyber-threats-chart1-v3-150x150.png 150w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/gfsr-ch3-cyber-threats-chart1-v3-768x768.png 768w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/gfsr-ch3-cyber-threats-chart1-v3.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<pre class=\"wp-block-preformatted\">\n\n\n\nCredit: Advisen Cyber Loss Data; Capital IQ; and IMF staff calculations<\/pre>\n\n\n\n<p>The threats are ever going and evolving, and with this companies are more susceptible to cyber incidents that result in large amounts of money loss. It is imperative that the cyber community creates opportunities to educate and grow to combat this fast pace and evolving threat. <\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cybersecurity-Market-Infographic-Edited-1-791x1024.png\" alt=\"\" class=\"wp-image-306\" style=\"width:387px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cybersecurity-Market-Infographic-Edited-1-791x1024.png 791w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cybersecurity-Market-Infographic-Edited-1-232x300.png 232w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cybersecurity-Market-Infographic-Edited-1-768x994.png 768w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cybersecurity-Market-Infographic-Edited-1-1187x1536.png 1187w, https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-content\/uploads\/sites\/40648\/2026\/02\/Cybersecurity-Market-Infographic-Edited-1-1583x2048.png 1583w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/figure><\/div>\n\n\n<pre class=\"wp-block-preformatted\">\n\nCredit: klogxisecuirty.com<\/pre>\n\n\n\n<p>The demand in the field is growing faster than the job positions that are being filled. Resulting in companies\/ businesses being undermanned. It is relative to the number of attacks. With more positions filled the less breaches there will be. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Credit: Thomas Barwick\/ Stone\/ Getty Images Diversity and inclusivity matters within the cybersecurity and social sciences field. It is important to have these different perspectives within the field. These attackers are coming from all different social backgrounds not just one gender, ethnicity or religion. Credit: Advisen Cyber Loss Data; Capital IQ; and IMF staff calculations&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/cyse-201s-2\/\">Read More<\/a><\/div>\n","protected":false},"author":32064,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-json\/wp\/v2\/pages\/286"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-json\/wp\/v2\/users\/32064"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-json\/wp\/v2\/pages\/286\/revisions"}],"predecessor-version":[{"id":309,"href":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-json\/wp\/v2\/pages\/286\/revisions\/309"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alissiametcalfe\/wp-json\/wp\/v2\/media?parent=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}