{"id":123,"date":"2025-09-11T14:35:12","date_gmt":"2025-09-11T14:35:12","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-09-13T19:02:03","modified_gmt":"2025-09-13T19:02:03","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Screenshot-2025-09-13-141925.png\"><img loading=\"lazy\" decoding=\"async\" width=\"633\" height=\"343\" src=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Screenshot-2025-09-13-141925.png\" alt=\"\" class=\"wp-image-219\" style=\"width:586px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Screenshot-2025-09-13-141925.png 633w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Screenshot-2025-09-13-141925-300x163.png 300w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Screenshot-2025-09-13-141925-554x300.png 554w\" sizes=\"(max-width: 633px) 100vw, 633px\" \/><\/a><\/figure><\/div>\n\n\n<div style=\"height:73px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"alignleft size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Cybersecurity-Best-Practices-2.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Cybersecurity-Best-Practices-2.jpeg\" alt=\"\" class=\"wp-image-223\" style=\"width:142px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Cybersecurity-Best-Practices-2.jpeg 1024w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Cybersecurity-Best-Practices-2-300x300.jpeg 300w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Cybersecurity-Best-Practices-2-150x150.jpeg 150w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/Cybersecurity-Best-Practices-2-768x768.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\">As time goes on our society as a whole begins to become even more revolved around technology. In turn our data stored on our personal devices and in databases for various companies and services becomes much more susceptible to attack. Thanks to cybersecurity and the social sciences we can help prevent these attacks by using various techniques to ethically and accurately predict them before they ever happen based on past trends. On top of this by introducing new advanced tech such as AI and machine learning we can heighten our data analysis allowing us to increase these defenses even more. As seen in the graphs below as we go further into the future the threats begin to rise, but the data at risk is beginning to see a decline due to our cybersecurity efforts. These threats will continue to rise with the higher technology increasing in everyone&#8217;s homes as well as the amount of desirable data online rising waiting to be attacked, so our cybersecurity innovations desperately need to stay ahead of this curve as our society continues to be more intertwined with this online world.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-2-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"802\" data-id=\"213\" src=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-2-1-1024x802.png\" alt=\"\" class=\"wp-image-213\" srcset=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-2-1-1024x802.png 1024w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-2-1-300x235.png 300w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-2-1-768x601.png 768w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-2-1-383x300.png 383w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-2-1.png 1300w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-1-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"781\" data-id=\"214\" src=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-1-1-1024x781.png\" alt=\"\" class=\"wp-image-214\" srcset=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-1-1-1024x781.png 1024w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-1-1-300x229.png 300w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-1-1-768x586.png 768w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-1-1-393x300.png 393w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/eng-cybersecurity-blog-dec-1-chart-1-1.png 1300w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized is-style-rounded\"><a href=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/1683785286786-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"904\" height=\"408\" src=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/1683785286786-2.png\" alt=\"\" class=\"wp-image-224\" style=\"object-fit:cover;width:800px;height:200px\" srcset=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/1683785286786-2.png 904w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/1683785286786-2-300x135.png 300w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/1683785286786-2-768x347.png 768w, https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-content\/uploads\/sites\/39588\/2025\/09\/1683785286786-2-600x271.png 600w\" sizes=\"(max-width: 904px) 100vw, 904px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-small-font-size\">Citations for images: (APA)<\/p>\n\n\n\n<ul>\n<li class=\"has-small-font-size\">International Monetary Fund. (2020, December 7). <em>Cyber risk is the new threat to financial stability<\/em> [Blog post]. IMF. <a href=\"https:\/\/www.imf.org\/en\/Blogs\/Articles\/2020\/12\/07\/blog-cyber-risk-is-the-new-threat-to-financial-stability\">https:\/\/www.imf.org\/en\/Blogs\/Articles\/2020\/12\/07\/blog-cyber-risk-is-the-new-threat-to-financial-stability<\/a><\/li>\n\n\n\n<li class=\"has-small-font-size\">LinkedIn. (n.d.). <em>The role of AI in cybersecurity: Threats and solutions<\/em> [Article]. LinkedIn. <a href=\"https:\/\/www.linkedin.com\/pulse\/role-ai-cybersecurity-threats-solutions-1c\/\">https:\/\/www.linkedin.com\/pulse\/role-ai-cybersecurity-threats-solutions-1c\/<\/a><\/li>\n\n\n\n<li class=\"has-small-font-size\">PC Technologies. (n.d.). <em>Cybersecurity best practices: Protecting your business in the digital age<\/em>. <a href=\"https:\/\/pchtechnologies.com\/cybersecurity-best-practices-protecting-your-business-in-the-digital-age\/\">https:\/\/pchtechnologies.com\/cybersecurity-best-practices-protecting-your-business-in-the-digital-age\/<\/a><\/li>\n\n\n\n<li class=\"has-small-font-size\">Watchtower IT Services. (n.d.). <em>Cybersecurity Seattle<\/em>. <a href=\"https:\/\/www.watchtowerits.com\/services\/cybersecurity-seattle\/\">https:\/\/www.watchtowerits.com\/services\/cybersecurity-seattle\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>As time goes on our society as a whole begins to become even more revolved around technology. In turn our data stored on our personal devices and in databases for various companies and services becomes much more susceptible to attack. Thanks to cybersecurity and the social sciences we can help prevent these attacks by using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/\">Read More<\/a><\/div>\n","protected":false},"author":31401,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-json\/wp\/v2\/users\/31401"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-json\/wp\/v2\/pages\/123\/revisions\/232"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cs201s-espruill\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}