{"id":305,"date":"2025-02-04T20:01:53","date_gmt":"2025-02-04T20:01:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/?page_id=305"},"modified":"2025-02-06T19:23:02","modified_gmt":"2025-02-06T19:23:02","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-1.jpg\" alt=\"\" class=\"wp-image-314\" style=\"width:608px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-1.jpg 900w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-1-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-1-450x300.jpg 450w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<p>Note. By A. Lyon Ritchie, &#8220;Improving Security Science Through Collaboration&#8221;, 2017, <a href=\"https:\/\/www.cmu.edu\/dietrich\/news\/news-stories\/2017\/august\/improving-security-science.html\">https:\/\/www.cmu.edu\/dietrich\/news\/news-stories\/2017\/august\/improving-security-science.html<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-2.jpeg\" alt=\"\" class=\"wp-image-315\" style=\"width:633px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-2.jpeg 1024w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-2-300x171.jpeg 300w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-2-768x439.jpeg 768w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-2-525x300.jpeg 525w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Note. By ARK Solvers, &#8220;How Cybersecurity Affects Society: What You Need To Know&#8221;, 2024, <\/p>\n\n\n\n<p><a href=\"https:\/\/arksolvers.com\/how-cybersecurity-affects-society\/\">https:\/\/arksolvers.com\/how-cybersecurity-affects-society\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-3-1024x576.jpeg\" alt=\"\" class=\"wp-image-316\" style=\"width:674px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-3-1024x576.jpeg 1024w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-3-300x169.jpeg 300w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-3-768x432.jpeg 768w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-3-533x300.jpeg 533w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-3.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Note. By K. Badary, &#8220;Beyond Firewalls: Why Social Engineering Remains the Achilles&#8217; Heel of Cybersecurity&#8221;, 2024<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/pulse\/beyond-firewalls-why-social-engineering-remains-achilles-badary-at49f\">https:\/\/www.linkedin.com\/pulse\/beyond-firewalls-why-social-engineering-remains-achilles-badary-at49f<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"495\" height=\"400\" src=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-4.jpg\" alt=\"\" class=\"wp-image-317\" style=\"width:628px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-4.jpg 495w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-4-300x242.jpg 300w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/cyber-4-371x300.jpg 371w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/figure>\n\n\n\n<p>Note. By NIC, &#8220;The Benefits of Tapping Into Cloud Processing Power&#8221;, 2018, <\/p>\n\n\n\n<p><a href=\"https:\/\/www.nicitpartner.com\/benefits-tapping-cloud-processing-power\/\">https:\/\/www.nicitpartner.com\/benefits-tapping-cloud-processing-power\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"268\" src=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/5.jpeg\" alt=\"\" class=\"wp-image-318\" style=\"width:621px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/5.jpeg 474w, https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-content\/uploads\/sites\/37240\/2025\/02\/5-300x170.jpeg 300w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/figure>\n\n\n\n<p>Note. By B. Tagoe, &#8220;Cybersecurity: The Art of Social Engineering&#8221;, 2024, <\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/pulse\/cybersecurity-art-social-engineering-ben-tagoe-vnlsf\">https:\/\/www.linkedin.com\/pulse\/cybersecurity-art-social-engineering-ben-tagoe-vnlsf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note. By A. Lyon Ritchie, &#8220;Improving Security Science Through Collaboration&#8221;, 2017, https:\/\/www.cmu.edu\/dietrich\/news\/news-stories\/2017\/august\/improving-security-science.html Note. By ARK Solvers, &#8220;How Cybersecurity Affects Society: What You Need To Know&#8221;, 2024, https:\/\/arksolvers.com\/how-cybersecurity-affects-society\/ Note. By K. Badary, &#8220;Beyond Firewalls: Why Social Engineering Remains the Achilles&#8217; Heel of Cybersecurity&#8221;, 2024 https:\/\/www.linkedin.com\/pulse\/beyond-firewalls-why-social-engineering-remains-achilles-badary-at49f Note. By NIC, &#8220;The Benefits of Tapping Into Cloud Processing Power&#8221;,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":29793,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/pages\/305"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/users\/29793"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/pages\/305\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/pages\/305\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/media?parent=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}