{"id":123,"date":"2025-01-20T23:51:55","date_gmt":"2025-01-20T23:51:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2026-02-13T04:43:18","modified_gmt":"2026-02-13T04:43:18","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p>I am currently in my second term as a cyber security major. Starting to see why it&#8217;s important to combine social studies with cyber security. Cyber security used to seem like mostly writing code and other things to keep computers and networks safe. However, I&#8217;ve learned that people&#8217;s actions are often what causes security issues. Knowing how people think and act, they try to get people to give them their passwords and other information. Studies in sociology and psychology can help us figure out what internet users do and how hackers can trick them. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-1024x578.png\" alt=\"\" class=\"wp-image-303\" srcset=\"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-1024x578.png 1024w, https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-300x169.png 300w, https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-768x433.png 768w, https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-532x300.png 532w, https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Hadnagy, C. (2018). <em>Social engineering principles<\/em> [Diagram]. Social-Engineer, LLC. <a href=\"https:\/\/www.social-engineer.org\/\">https:\/\/www.social-engineer.org\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"431\" src=\"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-1.png\" alt=\"\" class=\"wp-image-304\" srcset=\"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-1.png 767w, https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-1-300x169.png 300w, https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-1-534x300.png 534w\" sizes=\"(max-width: 767px) 100vw, 767px\" \/><\/figure>\n\n\n\n<p>National Cyber Security Alliance. (2022). <em>Cybersecurity awareness training<\/em> [Photograph]. <a href=\"https:\/\/staysafeonline.org\/\">https:\/\/staysafeonline.org\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"138\" src=\"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-2.png\" alt=\"\" class=\"wp-image-305\" srcset=\"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-2.png 365w, https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-content\/uploads\/sites\/39988\/2026\/02\/image-2-300x113.png 300w\" sizes=\"(max-width: 365px) 100vw, 365px\" \/><\/figure>\n\n\n\n<p>Export. (2016, August 18). <em>Understanding the mind of a hacker<\/em>. Cognoscape. <a href=\"https:\/\/www.cognoscape.com\/the-mind-of-a-hacker\/?utm_source=chatgpt.com\">https:\/\/www.cognoscape.com\/the-mind-of-a-hacker\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am currently in my second term as a cyber security major. Starting to see why it&#8217;s important to combine social studies with cyber security. Cyber security used to seem like mostly writing code and other things to keep computers and networks safe. However, I&#8217;ve learned that people&#8217;s actions are often what causes security issues&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/chasemcknight17\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":31615,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/users\/31615"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/pages\/123\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}