{"id":517,"date":"2026-02-20T13:59:42","date_gmt":"2026-02-20T13:59:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cbelf001\/?page_id=517"},"modified":"2026-02-20T14:09:10","modified_gmt":"2026-02-20T14:09:10","slug":"experience-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cbelf001\/experience-1\/","title":{"rendered":"Experience #1 &#8211; IDS"},"content":{"rendered":"\n<p id=\"block-3a567bfd-1d63-49e8-86f9-e9de4d642a8f\"><\/p>\n\n\n\n<p id=\"block-1414a860-471c-4a2e-8638-f139a7f46c3a\">As well as the technical experience, cybersecurity also needs much more&#8230;<\/p>\n\n\n\n<p id=\"block-a0a1339b-090b-4ccd-957b-4f7b19a7cf38\">Cybersecurity is an extremely intricate field that, goes beyond the technical aspects of the sector, such as firewalls, threat detection systems, hardware, software, coding, etc. In fact, it\u2019s a field that encompasses many aspects of society, bridging technology with psychology, law, geopolitics, ethics, and even criminal justice, to name a few.&nbsp;By integrating the different approaches and perspectives each discipline has to offer to cybersecurity, it is clear that collaboration across disciplines is crucial in order to have a comprehensive understanding and a solid foundation for the cyberspace.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-d3e3c7d2-addd-4b5d-82d9-b5b1ace71dff\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-content\/uploads\/sites\/35474\/2026\/02\/IMG_6890-772x1024.jpg\" alt=\"This image has an empty alt attribute; its file name is IMG_6890-772x1024.jpg\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>As well as the technical experience, cybersecurity also needs much more&#8230; Cybersecurity is an extremely intricate field that, goes beyond the technical aspects of the sector, such as firewalls, threat detection systems, hardware, software, coding, etc. In fact, it\u2019s a&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cbelf001\/experience-1\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28443,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/517"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/users\/28443"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/comments?post=517"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/517\/revisions"}],"predecessor-version":[{"id":535,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/517\/revisions\/535"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/media?parent=517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}