{"id":185,"date":"2025-02-03T04:51:36","date_gmt":"2025-02-03T04:51:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/?page_id=185"},"modified":"2025-02-03T04:57:18","modified_gmt":"2025-02-03T04:57:18","slug":"home","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/home\/","title":{"rendered":"Home"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/cyber-security-concept-closed-digital-padlock-vector-27449762.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"780\" src=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/cyber-security-concept-closed-digital-padlock-vector-27449762.jpg\" alt=\"\" class=\"wp-image-186\" srcset=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/cyber-security-concept-closed-digital-padlock-vector-27449762.jpg 1000w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/cyber-security-concept-closed-digital-padlock-vector-27449762-300x234.jpg 300w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/cyber-security-concept-closed-digital-padlock-vector-27449762-768x599.jpg 768w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/cyber-security-concept-closed-digital-padlock-vector-27449762-600x468.jpg 600w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/cyber-security-concept-closed-digital-padlock-vector-27449762-945x737.jpg 945w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><figcaption class=\"wp-element-caption\">Symbolizes core of cybersecurity and the importance of protecting data and systems<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/Ethical-Hacker-Sectricity.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"688\" src=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/Ethical-Hacker-Sectricity-1024x688.jpg\" alt=\"\" class=\"wp-image-187\" srcset=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/Ethical-Hacker-Sectricity-1024x688.jpg 1024w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/Ethical-Hacker-Sectricity-300x202.jpg 300w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/Ethical-Hacker-Sectricity-768x516.jpg 768w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/Ethical-Hacker-Sectricity-600x403.jpg 600w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/Ethical-Hacker-Sectricity-945x635.jpg 945w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/Ethical-Hacker-Sectricity.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Risk of hackers and the threats cybersecurity aims to protect against<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/ezgif.com-gif-maker-4.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"309\" src=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/ezgif.com-gif-maker-4.jpg\" alt=\"\" class=\"wp-image-188\" srcset=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/ezgif.com-gif-maker-4.jpg 550w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/ezgif.com-gif-maker-4-300x169.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><figcaption class=\"wp-element-caption\">Protection of personal data as privacy of information is important in this field<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/istockphoto-1321462048-612x612-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"344\" src=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/istockphoto-1321462048-612x612-1.jpg\" alt=\"\" class=\"wp-image-189\" srcset=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/istockphoto-1321462048-612x612-1.jpg 612w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/istockphoto-1321462048-612x612-1-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/istockphoto-1321462048-612x612-1-600x337.jpg 600w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/a><figcaption class=\"wp-element-caption\">Technolgy carries a huge societal impact and how the world relies on it for important task<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/AdobeStock_625228834.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/AdobeStock_625228834-1024x577.jpg\" alt=\"\" class=\"wp-image-190\" srcset=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/AdobeStock_625228834-1024x577.jpg 1024w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/AdobeStock_625228834-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/AdobeStock_625228834-768x433.jpg 768w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/AdobeStock_625228834-600x338.jpg 600w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/AdobeStock_625228834-945x532.jpg 945w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/AdobeStock_625228834.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">The constant innovation of new technology<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/360_F_1126992372_mFaR7NY8zufoAo6JpatBcH3bV5RHVVva.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"540\" height=\"360\" src=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/360_F_1126992372_mFaR7NY8zufoAo6JpatBcH3bV5RHVVva.jpg\" alt=\"\" class=\"wp-image-191\" srcset=\"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/360_F_1126992372_mFaR7NY8zufoAo6JpatBcH3bV5RHVVva.jpg 540w, https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-content\/uploads\/sites\/38472\/2025\/02\/360_F_1126992372_mFaR7NY8zufoAo6JpatBcH3bV5RHVVva-300x200.jpg 300w\" sizes=\"(max-width: 540px) 100vw, 540px\" \/><\/a><figcaption class=\"wp-element-caption\">weighing both ends into the balancing of cybersecurity and data privacy <\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":29750,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-json\/wp\/v2\/pages\/185"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-json\/wp\/v2\/users\/29750"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-json\/wp\/v2\/pages\/185\/revisions"}],"predecessor-version":[{"id":201,"href":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-json\/wp\/v2\/pages\/185\/revisions\/201"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alovo001cyse201s\/wp-json\/wp\/v2\/media?parent=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}