{"id":31,"date":"2025-01-31T15:11:24","date_gmt":"2025-01-31T15:11:24","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=31"},"modified":"2025-02-02T23:32:01","modified_gmt":"2025-02-02T23:32:01","slug":"about-me","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/csloa004\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182639_docs.google.com_.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"432\" src=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182639_docs.google.com_.jpeg\" alt=\"\" class=\"wp-image-259\" srcset=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182639_docs.google.com_.jpeg 770w, https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182639_docs.google.com_-300x168.jpeg 300w, https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182639_docs.google.com_-768x431.jpeg 768w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/><\/a><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Source &#8211; https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2022\/11\/21\/why-cybersecurity-should-be-part-of-any-business-strategy\/<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182759_docs.google.com_.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"718\" height=\"673\" src=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182759_docs.google.com_.jpeg\" alt=\"\" class=\"wp-image-261\" srcset=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182759_docs.google.com_.jpeg 718w, https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182759_docs.google.com_-300x281.jpeg 300w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/a><\/figure>\n\n\n\n<p>Source &#8211; https:\/\/www.mdpi.com\/2071-1050\/15\/18\/13369<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182844_docs.google.com_.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"430\" src=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182844_docs.google.com_.jpeg\" alt=\"\" class=\"wp-image-262\" srcset=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182844_docs.google.com_.jpeg 767w, https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182844_docs.google.com_-300x168.jpeg 300w\" sizes=\"(max-width: 767px) 100vw, 767px\" \/><\/a><\/figure>\n\n\n\n<p>Source &#8211; https:\/\/www.zdnet.com\/article\/cybersecurity-how-to-devise-a-winning-strategy\/<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182923_docs.google.com_.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"773\" height=\"342\" src=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182923_docs.google.com_.jpeg\" alt=\"\" class=\"wp-image-263\" srcset=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182923_docs.google.com_.jpeg 773w, https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182923_docs.google.com_-300x133.jpeg 300w, https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_182923_docs.google.com_-768x340.jpeg 768w\" sizes=\"(max-width: 773px) 100vw, 773px\" \/><\/a><\/figure>\n\n\n\n<p>Source &#8211; <a href=\"https:\/\/www.uscybersecurity.net\/why-data-protection-must-be-a-part-of-every-cybersecurity-strategy\/\">Why Data Protection Must Be a Part of Every Cybersecurity Strategy &#8211; United States Cybersecurity Magazine<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_183131_docs.google.com_.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"646\" height=\"314\" src=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_183131_docs.google.com_.jpeg\" alt=\"\" class=\"wp-image-264\" srcset=\"https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_183131_docs.google.com_.jpeg 646w, https:\/\/sites.wp.odu.edu\/csloa004\/wp-content\/uploads\/sites\/38359\/2025\/02\/Screenshot_2-2-2025_183131_docs.google.com_-300x146.jpeg 300w\" sizes=\"(max-width: 646px) 100vw, 646px\" \/><\/a><\/figure>\n\n\n\n<p>Source &#8211; https:\/\/www.comodo.com\/resources\/home\/how-firewalls-work.php<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source &#8211; https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2022\/11\/21\/why-cybersecurity-should-be-part-of-any-business-strategy\/ Source &#8211; https:\/\/www.mdpi.com\/2071-1050\/15\/18\/13369 Source &#8211; https:\/\/www.zdnet.com\/article\/cybersecurity-how-to-devise-a-winning-strategy\/ Source &#8211; Why Data Protection Must Be a Part of Every Cybersecurity Strategy &#8211; United States Cybersecurity Magazine Source &#8211; https:\/\/www.comodo.com\/resources\/home\/how-firewalls-work.php<\/p>\n","protected":false},"author":30476,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/csloa004\/wp-json\/wp\/v2\/pages\/31"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/csloa004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/csloa004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/csloa004\/wp-json\/wp\/v2\/users\/30476"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/csloa004\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/csloa004\/wp-json\/wp\/v2\/pages\/31\/revisions"}],"predecessor-version":[{"id":265,"href":"https:\/\/sites.wp.odu.edu\/csloa004\/wp-json\/wp\/v2\/pages\/31\/revisions\/265"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/csloa004\/wp-json\/wp\/v2\/media?parent=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}